Typical response time: under 250 ms. Covers 42+ states (including OWCP).
What you get in every response
- Allowed reimbursement amounts per service line
- Reduction explanations and reason codes
- Step-by-step calculation logic (RuleTrace™)
- Fee schedule citations with source URLs
- A shareable QR-linked review report
How authentication works
BillSentry uses a two-header model on every request:| Header | Purpose |
|---|---|
Authorization: Bearer {access_token} | Proves your identity (short-lived M2M JWT) |
x-api-key: {api_key} | Routes the request to your tenant |
Your credentials
BillSentry will provision these during onboarding. Store them securely — treat them the same as passwords.| Credential | Description | Example format |
|---|---|---|
| Client ID | OAuth2 M2M client identifier | m2m-client-live-xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx |
| Client Secret | OAuth2 M2M client secret — never expose publicly | Jj8K... (64+ chars) |
| API Key | Per-tenant key sent in x-api-key header | billsentry_prod_yourcompany_1234 |
| Token URL | OAuth2 token endpoint | Provided during onboarding |
| API Endpoint URL | Your dedicated API gateway URL | Provided during onboarding |
Each API customer receives a dedicated API endpoint URL provisioned exclusively for your organization. Do not use another customer’s endpoint URL.Sandbox credentials include a separate endpoint URL and Token URL.
Architecture
- Validates the Bearer token signature
- Confirms the token
subclaim matches your registered M2M client ID - Confirms the
x-api-keyis active and bound to your tenant - Proxies the request to the BillSentry processing engine (internal — you do not call this directly)