Core concepts
Understand the foundational patterns that make integrations with the insp.ac API secure, reliable, and forward-compatible.
Authentication
API key management, Bearer token usage, and secure key storage patterns.
Rate limits
Per-key per-route throttling, response headers, and backoff strategies.
Scopes
Least-privilege key configuration, scope enforcement, and permission errors.
Field operations workflows
How users, check-ins, logs/comments, and sensor input work together in API integrations.
Errors
Error envelope structure, status codes, machine-readable codes, and retry classification.
Idempotency
Safe retries with Idempotency-Key for POST and PATCH operations.
Versioning and deprecation
API versioning scheme, deprecation signals, and migration guidance.