Get a Product by ID
GET
v1/products/{product_id}/Get product by ID as Manager or as Customer.
Managers need to provide the Authorization
and X-Manager-Token
headers, and the Role
should be set to Manager
.
Customers don't need an authorization token, and the Role
should be set to Customer
.
Both Customer and Manager get essentially the same object with two key differences for managers:
- In the Manager response, both the
name
field and thevalue
field in theattributes
array are objects containing "ar" (Arabic) and "en" (English) strings, while in the Customer response, they are just single strings. - The Manager response contains two additional fields:
created_at
andupdated_at
, which provide timestamps for when the product was created and last updated.
These are the main structural differences between the two responses. Other than that, they share the same structure, including the nested arrays and objects.
Request
Preferred language for the response (No effect for Managers; defaults to en
for Customers if not provided).
Role of the user.
The Authorization token is a unique key given to the third-party application (Partner) by Zid. It is used to authenticate the API requests made by the Partner application. The token verifies the partner's identity and ensures they have permission to access Zid's API but does not provide any specific user or store information. It should be included in the header of API requests when the partner application needs to access Zid's API.
An Access Token is a unique string that represents the authorization granted to a client (Partner application) by a user (Merchant or Store Manager) to access their protected resources. It is part of the OAuth 2.0 standard and is used to authenticate API requests on behalf of the user. Access Tokens have a limited lifespan and must be used within their validity period. Once expired, a new Access Token can be obtained using a Refresh Token. Access Tokens should be treated as sensitive information and must be kept secure to prevent unauthorized access to the user's data. If you do not have an Access-Token
, but have the older alternative instead, i.e., the X-Manager-Token
, then see the instructions here on how to obtain the Access-Token
.