POST / GET parameters

Description

Authenticating with the Mobypicture API is possible using POST or GET variables, depending on the rest of the parameters. Every authenticated call accepts a username and a pin parameter.

Parameters

  • username

    Mobypicture username.

  • pin

    Mobypicture PIN.

    Unofficially, a Twitter password is still accepted and will be converted, by us, via Twitter xAuth, to OAuth keys. We do not store any passwords from Twitter. Twitter’s OAuth Echo is however the preferred method of authentication with Twitter.

Example:

http://api.mobypicture.com?action=checkCredentials&username=<username>&pin=<pin>&k=<key>&format=json

Authenticating with Twitter

Don’t you have the Mobypicture credentials of a given user and want to authenticate against Twitter, have a look at our OAuth Echo implementation.

This page is last updated on February 13, 2011 by

Comment Form

About Mobypicture Developers

Build your own applications on top of Mobypicture, like over 600 others have done before you using our extensive API.

You can find find out more about the usage of the Mobypicture API in the API Documentation. To use the API you have to get a developer key. This also allows you to promote your Mobypicture enabled app on the Mobypicture website.

Get a Mobypicture developer key

RSS Mobypicture product news

  • Raising December 12, 2017
    As some of you readers may know, over the last two years, in 'stealth' I've been working on a Meta-charitable idea called Kinder.  It started with a What if...
  • Bore the spammers to death. AI to the resque. November 9, 2017
    Email scamming is a billion dollar business with millions of victims.Netsafe came up with a weapon. I like this approach.
  • Artificial intelligence-powered dystopia November 1, 2017
    In an eye-opening talk, she details how the same algorithms companies like Facebook, Google and Amazon use to get you to click on ads are also used to organize your access to political and social information. And the machines aren't even the real threat. What we need to understand is how the powerful might use […]