If you're used to integrating with consumer APIs, DoorFlow's security requirements might seem strict. Here's why physical access control needs a different approach.
What's at Stake
Consumer APIs
Physical Access APIs
The difference: Physical access directly impacts real-world safety and security. A compromised API key doesn't just leak data - it could let unauthorized people into buildings.
No Fraud Checks or Chargebacks
This is the most critical difference from financial APIs:
Financial API (like Stripe)
Physical Access API (like DoorFlow)
Example scenario:
Compromised API credentials unlock a door at 2am. Someone enters the building and:
- Accesses confidential files
- Steals equipment
- Compromises security systems
- Leaves before anyone knows
You cannot
This is why OAuth is required. Unlike financial transactions that can be reversed, physical access is permanent and immediate.
Why OAuth Instead of API Keys
With API keys, DoorFlow would have no way to know
With OAuth
Common Questions
Why can't I just use API keys for testing?
A: You'd build your entire integration around API keys, then have to completely rewrite it for OAuth in production. OAuth testing is straightforward - and we have guides to help.
This seems like overkill for my simple use case.
A: Physical access control has no "simple" use cases. Even unlocking one door involves legal liability, insurance requirements, and audit obligations. The OAuth overhead is minimal compared to these risks.
Can't you just trust established developers?
A: Physical security operates on "Zero Trust" principles. Even trusted partners could have security breaches, rogue employees, or bugs that expose credentials. It's not personal - it's how physical security works.
The Bottom Line
You're not just building an app - you're building part of a physical security system.
The OAuth overhead is minimal. The security benefits are essential.
Next Steps
Never used OAuth before?
- [What is OAuth and Why Use It?] - Start here
Want to understand more?
- [Physical Access Security Deep Dive] - Compliance, granular permissions, industry standards
- [Understanding Security Requirements] - What you need to implement
Ready to build?
- [Your First API Request] - Working example
- [OAuth Authorization Flow] - Visual guide
- [Quickstart Guide] - Complete implementation