Skip to main content

Overview

API keys authenticate requests to the API without using your password.

Creating Keys

Generate keys with specific permissions and expiration dates.

Security Best Practices

  • Rotate keys regularly
  • Never commit keys to version control
  • Use environment variables
  • Set expiration dates

Revoking Keys

Immediately revoke compromised keys through the dashboard.