Access Key Authorization
Although not very secure without Transport Layer Security (TLS), a simple method to authorize your device is to look for either the primary or secondary Access Keys as Security Fields within your message.
The keys must be sent in plain text. Use the Security Field Locator to find them.
To implement Access Key Authorization, use the generated Base64 keys as part of adding a device. You can also add your own custom access keys.