If the security of both API keys and user access tokens are compromised, your This will provide confidentiality, integrity (of the data), and authentication..