{"id":12654,"date":"2026-03-13T17:33:48","date_gmt":"2026-03-13T16:33:48","guid":{"rendered":"https:\/\/evidency.io\/?p=12654"},"modified":"2026-03-13T17:33:48","modified_gmt":"2026-03-13T16:33:48","slug":"api-integration-key-concepts-definitions","status":"publish","type":"post","link":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/","title":{"rendered":"API and integration: definitions of key concepts"},"content":{"rendered":"<h2 class=\"wp-block-heading\">What is an API?<\/h2>\n\n\n\n<p>An API (Application Programming Interface) is a programming interface that allows one software application to call functions exposed by another software application according to published rules (methods, parameters, formats and return codes).<\/p>\n\n\n\n<p>In the most common scenario (web APIs), these exchanges rely on HTTP: a client sends a request and the server returns a response, using standardised semantics (methods, status codes and headers).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a REST API?<\/h2>\n\n\n\n<p>A REST API refers to a web API built according to the REST (Representational State Transfer) architectural style described by Roy Fielding: interactions concern identified resources, manipulated through representations, using self-descriptive messages, within a stateless model (no server-side session state in the REST sense).<\/p>\n\n\n\n<p>In practice, the term \u201cREST\u201d is often used to describe HTTP APIs that structure their URLs around resources and apply HTTP methods and status codes consistently.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is an endpoint?<\/h2>\n\n\n\n<p>An endpoint is a specific access point of an API: typically a combination of (i) a URL (or route), (ii) an HTTP method (GET, POST, etc.), and (iii) an expected behaviour (parameters, response schema, possible errors).<\/p>\n\n\n\n<p>The collection of endpoints forms the API as a whole. The terminology used (methods, status codes) follows HTTP semantics.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a webhook?<\/h2>\n\n\n\n<p>A webhook is a push notification mechanism: instead of the client querying the API to determine whether an event has occurred, the server calls a URL provided by the client (callback) to transmit the event.<\/p>\n\n\n\n<p>Within an evidentiary chain, webhooks are frequently used to notify the completion of a process (for example: \u201ctoken available\u201d, \u201cdocument sealed\u201d, \u201carchiving completed\u201d). This requires securing the sender, reception and logging of the call.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the payload?<\/h2>\n\n\n\n<p>The payload is the message body carrying the business data being transmitted (for example a JSON structure, binary content or a hash value).<\/p>\n\n\n\n<p>In HTTP, the payload is generally contained in the message body, while headers describe elements such as content type, encoding and authentication.<\/p>\n\n\n\n<p>In an evidentiary system, a key point is to identify precisely what belongs to the payload (data, <a href=\"https:\/\/evidency.io\/en\/hashing-digital-integrity-timestamping\/\">hash<\/a>, metadata) and what belongs to the headers (transport context, security information), in order to avoid ambiguity during verification.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is authentication?<\/h2>\n\n\n\n<p>Authentication is the mechanism through which a system verifies that a caller is indeed who it claims to be (for example through a secret, a certificate or a token).<\/p>\n\n\n\n<p>In HTTP, authentication is commonly expressed through the Authorization and WWW-Authenticate fields and the associated schemes.<\/p>\n\n\n\n<p>In a digital trust API, authentication operates alongside authorisation (permissions) and usage controls (quotas, abuse prevention), as API vulnerabilities frequently arise from incomplete or improperly implemented access controls (OWASP reference).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is TLS?<\/h2>\n\n\n\n<p>TLS (Transport Layer Security) is the security protocol that enables client and server applications to communicate while reducing the risk of interception, alteration or falsification of messages on the network. It forms the basis of HTTPS (and therefore of most web APIs).<\/p>\n\n\n\n<p>TLS does not, by itself, establish evidential proof; it secures the transport layer. The probative value of a system then depends on application-level mechanisms (integrity of generated objects, traceability, preservation and verification). Nevertheless, TLS is a technical prerequisite to limit disputes relating to the transmission channel.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>What is an API? An API (Application Programming Interface) is a programming interface that allows one software application to call functions exposed by another software application according to published rules (methods, parameters, formats and return codes). In the most common scenario (web APIs), these exchanges rely on HTTP: a client sends a request and the [&hellip;]<\/p>\n","protected":false},"author":246879322,"featured_media":12655,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[6410],"tags":[],"ppma_author":[6450],"class_list":["post-12654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-timestamping","author-camille-lehur"],"acf":{"profil":"","bio":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Technical glossary of API integration: REST, endpoint, webhook, payload, TLS<\/title>\n<meta name=\"description\" content=\"Clear definitions of API and integration concepts used in digital evidence systems: API, REST API, endpoint, webhook, payload, authentication and TLS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technical glossary of API integration: REST, endpoint, webhook, payload, TLS\" \/>\n<meta property=\"og:description\" content=\"Clear definitions of API and integration concepts used in digital evidence systems: API, REST API, endpoint, webhook, payload, authentication and TLS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidency\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-13T16:33:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1425\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Camille Lehur\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camille Lehur\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/\"},\"author\":{\"name\":\"Camille Lehur\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/f7ebaf877dd313943955f5f6f4b6109a\"},\"headline\":\"API and integration: definitions of key concepts\",\"datePublished\":\"2026-03-13T16:33:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp\",\"articleSection\":[\"Timestamping\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/\",\"url\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/\",\"name\":\"Technical glossary of API integration: REST, endpoint, webhook, payload, TLS\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp\",\"datePublished\":\"2026-03-13T16:33:48+00:00\",\"description\":\"Clear definitions of API and integration concepts used in digital evidence systems: API, REST API, endpoint, webhook, payload, authentication and TLS.\",\"breadcrumb\":{\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#primaryimage\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp\",\"width\":1425,\"height\":750,\"caption\":\"API et integration definitions des notions cles\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidency\",\"item\":\"https:\/\/evidency.io\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"API and integration: definitions of key concepts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/evidency.io\/en\/#website\",\"url\":\"https:\/\/evidency.io\/en\/\",\"name\":\"Evidency\",\"description\":\"Sp\u00e9cialiste de la preuve num\u00e9rique\",\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/evidency.io\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/evidency.io\/en\/#organization\",\"name\":\"Evidency\",\"url\":\"https:\/\/evidency.io\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"width\":275,\"height\":58,\"caption\":\"Evidency\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/evidency-io\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/f7ebaf877dd313943955f5f6f4b6109a\",\"name\":\"Camille Lehur\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/0136f4c427d33956c0ce6ac1e3707f4c\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille.webp\",\"caption\":\"Camille Lehur\"},\"description\":\"Camille est Responsable Marketing Digital chez Evidency. Forte de plus de 10 ans d'exp\u00e9rience, elle est sp\u00e9cialis\u00e9e dans la gestion de contenu et l'acquisition de trafic.\",\"sameAs\":[\"https:\/\/google.com\/\"],\"url\":\"https:\/\/evidency.io\/en\/author\/camille-lehur\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technical glossary of API integration: REST, endpoint, webhook, payload, TLS","description":"Clear definitions of API and integration concepts used in digital evidence systems: API, REST API, endpoint, webhook, payload, authentication and TLS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/","og_locale":"en_US","og_type":"article","og_title":"Technical glossary of API integration: REST, endpoint, webhook, payload, TLS","og_description":"Clear definitions of API and integration concepts used in digital evidence systems: API, REST API, endpoint, webhook, payload, authentication and TLS.","og_url":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/","og_site_name":"Evidency","article_published_time":"2026-03-13T16:33:48+00:00","og_image":[{"width":1425,"height":750,"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp","type":"image\/webp"}],"author":"Camille Lehur","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camille Lehur","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#article","isPartOf":{"@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/"},"author":{"name":"Camille Lehur","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/f7ebaf877dd313943955f5f6f4b6109a"},"headline":"API and integration: definitions of key concepts","datePublished":"2026-03-13T16:33:48+00:00","mainEntityOfPage":{"@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/"},"wordCount":535,"publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"image":{"@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp","articleSection":["Timestamping"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/","url":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/","name":"Technical glossary of API integration: REST, endpoint, webhook, payload, TLS","isPartOf":{"@id":"https:\/\/evidency.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#primaryimage"},"image":{"@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp","datePublished":"2026-03-13T16:33:48+00:00","description":"Clear definitions of API and integration concepts used in digital evidence systems: API, REST API, endpoint, webhook, payload, authentication and TLS.","breadcrumb":{"@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#primaryimage","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/03\/API-et-integration-definitions-des-notions-cles.webp","width":1425,"height":750,"caption":"API et integration definitions des notions cles"},{"@type":"BreadcrumbList","@id":"https:\/\/evidency.io\/en\/api-integration-key-concepts-definitions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidency","item":"https:\/\/evidency.io\/en\/"},{"@type":"ListItem","position":2,"name":"API and integration: definitions of key concepts"}]},{"@type":"WebSite","@id":"https:\/\/evidency.io\/en\/#website","url":"https:\/\/evidency.io\/en\/","name":"Evidency","description":"Sp\u00e9cialiste de la preuve num\u00e9rique","publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evidency.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evidency.io\/en\/#organization","name":"Evidency","url":"https:\/\/evidency.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","width":275,"height":58,"caption":"Evidency"},"image":{"@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evidency-io\/"]},{"@type":"Person","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/f7ebaf877dd313943955f5f6f4b6109a","name":"Camille Lehur","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/0136f4c427d33956c0ce6ac1e3707f4c","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille.webp","caption":"Camille Lehur"},"description":"Camille est Responsable Marketing Digital chez Evidency. Forte de plus de 10 ans d'exp\u00e9rience, elle est sp\u00e9cialis\u00e9e dans la gestion de contenu et l'acquisition de trafic.","sameAs":["https:\/\/google.com\/"],"url":"https:\/\/evidency.io\/en\/author\/camille-lehur\/"}]}},"modified_by":"Cl\u00e9a Guinaudeau","authors":[{"term_id":6450,"user_id":246879322,"is_guest":0,"slug":"camille-lehur","display_name":"Camille Lehur","avatar_url":{"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille-1.webp","url2x":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Camille-1.webp"},"author_category":"1","first_name":"Camille","description_complete":"Camille is the Digital Marketing Manager at Evidency. With over 10 years of experience, she specialises in content management and traffic acquisition.","domaine_dexpertise":"<ul>\r\n \t<li>Digital marketing<\/li>\r\n<\/ul>","last_name":"Lehur","user_url":"","job_title":"Digital Marketing Manager","linkedin":"https:\/\/www.linkedin.com\/in\/camille-lehur\/","description":"Camille is the Digital Marketing Manager at Evidency. With over 10 years of experience, she specialises in content management and traffic acquisition."}],"_links":{"self":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/users\/246879322"}],"replies":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/comments?post=12654"}],"version-history":[{"count":2,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12654\/revisions"}],"predecessor-version":[{"id":12659,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/12654\/revisions\/12659"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media\/12655"}],"wp:attachment":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media?parent=12654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/categories?post=12654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/tags?post=12654"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/ppma_author?post=12654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}