OAuth 1.0 is a signature-based authorization scheme. Each request is signed with credentials you hold (a consumer key and access token, plus secrets) using a signature method you pick. The signature, signing parameters, and your credentials are sent in theDocumentation Index
Fetch the complete documentation index at: https://docs.requestly.com/llms.txt
Use this file to discover all available pages before exploring further.
Authorization header or in the request body.
Use OAuth 1.0 when an API explicitly requires it (Twitter API v1.1, older Atlassian and Yahoo APIs, parts of Magento, and various RFC 5849 implementations). Most modern APIs use OAuth 2.0 instead.

Choose OAuth 1.0 as the auth type
Select OAuth 1.0
Pick OAuth 1.0 from the Authorization type dropdown. The OAuth 1.0 fields appear below the dropdown.
Field reference
Credentials
| Field | Purpose |
|---|---|
| Consumer Key | Public identifier the provider issued for your application. |
| Consumer Secret | Shared secret paired with the consumer key. Used to sign the request. |
| Access Token | Token that represents the resource owner’s grant to your application. |
| Token Secret | Shared secret paired with the access token. Used together with the consumer secret to sign the request. |
{{vault:twitter_consumer_secret}}) rather than pasting them inline.
Signature Method
Pick the algorithm used to sign the request. Requestly supports seven methods:| Method | What it uses |
|---|---|
| HMAC-SHA1 | HMAC keyed by your consumer and token secrets. Most widely supported. |
| HMAC-SHA256 | HMAC variant using SHA-256. Stronger than SHA-1; supported by newer providers. |
| HMAC-SHA512 | HMAC variant using SHA-512. |
| PLAINTEXT | Sends the secrets directly, with no signing. Only safe over HTTPS. |
| RSA-SHA1 | RSA signature using your private key and SHA-1 digest. |
| RSA-SHA256 | RSA signature with SHA-256 digest. |
| RSA-SHA512 | RSA signature with SHA-512 digest. |
When you pick an
RSA-* method, an RSA Private Key field appears. Paste the PEM-encoded private key (the block that starts with -----BEGIN RSA PRIVATE KEY----- or -----BEGIN PRIVATE KEY-----). The consumer secret and token secret fields are still used to populate the standard OAuth parameters, but the signature itself is computed from the RSA key.Realm
Optional. If the provider expects arealm parameter inside the Authorization header (RFC 5849 §3.5.1), set it here. Leave blank when the provider does not require it.
Add params to
Where to put the OAuth parameters. Two choices:- Header (default): Requestly sends them in the
Authorizationheader asOAuth oauth_consumer_key="…", oauth_token="…", …. - Body: Requestly sends them as
application/x-www-form-urlencodedfields in the request body. Only valid when the request has a form body and uses a method that carries one (POST,PUT,PATCH).
Include body hash
When on, Requestly adds theoauth_body_hash extension parameter (OAuth Request Body Hash spec) to the signature for requests whose body is not application/x-www-form-urlencoded. Some providers (notably parts of the Yahoo and Google legacy APIs) require this; most do not.
Add empty parameters
When on, query parameters and form fields that have a name but an empty value are included in the signature base string. Some providers require empty parameters to be signed; the default is off because most do not.Encode OAuth params in header
When on, theoauth_* values inside the Authorization header are percent-encoded a second time. This matches a stricter reading of RFC 5849 §3.5.1 that some providers enforce. If signature verification keeps failing for no obvious reason, try toggling this.
What Requestly does for you automatically
You do not need to fill in these OAuth parameters manually:oauth_nonce(a fresh random nonce per request)oauth_timestamp(current Unix time)oauth_signature_method(driven by the Signature Method dropdown)oauth_version(always1.0)oauth_signature(computed from the signature base string and your secrets / private key)
Troubleshooting
The provider returns 401 Unauthorized
The provider returns 401 Unauthorized
Signature_invalid even though credentials look right
Signature_invalid even though credentials look right
Check that Consumer Secret and Token Secret have not been accidentally URL-encoded before you pasted them in. Requestly performs the OAuth encoding itself; double-encoding produces an invalid signature.
RSA signing fails with a key parse error
RSA signing fails with a key parse error
Confirm the key is PEM-encoded (begins with
-----BEGIN). Encrypted PEM keys with a passphrase are not supported - decrypt the key first, or generate an unencrypted copy for use here.What’s Next?
OAuth 2.0
Set up grant-type-driven OAuth 2.0 flows.
Vault
Store OAuth secrets securely outside your collection.
Variables
Reference OAuth credentials by name across requests.


