2.3. Request Authentication MethodsArticlesSHA-1 Request Authentication MethodOAuth Request Authentication Method