New Secure API Key Management
Per-user control, token-based access, and expiration dates
We’ve introduced a brand-new, highly secure method for managing API authentication:
Per-user, per-workspace API keys
Each API key is linked to a specific user and workspace for complete traceability.
Custom expiration dates
You can now assign expiration dates to each key, for better security governance and compliance.
Access token support
We now support token-based flows, with the ability to rotate or revoke tokens independently of the API key.
⚠️ The current API access method remains active for now to ensure backward compatibility. However, this new system will fully replace it by the end of 2025.
This upgrade enables more secure, manageable and auditable API usage, and paves the way for features like OAuth or endpoint-specific access control.
New Secure API Key Management
Per-user control, token-based access, and expiration dates
We’ve introduced a brand-new, highly secure method for managing API authentication:
Per-user, per-workspace API keys
Each API key is linked to a specific user and workspace for complete traceability.
Custom expiration dates
You can now assign expiration dates to each key, for better security governance and compliance.
Access token support
We now support token-based flows, with the ability to rotate or revoke tokens independently of the API key.
⚠️ The current API access method remains active for now to ensure backward compatibility. However, this new system will fully replace it by the end of 2025.
This upgrade enables more secure, manageable and auditable API usage, and paves the way for features like OAuth or endpoint-specific access control.
New Secure API Key Management
Per-user control, token-based access, and expiration dates
We’ve introduced a brand-new, highly secure method for managing API authentication:
Per-user, per-workspace API keys
Each API key is linked to a specific user and workspace for complete traceability.
Custom expiration dates
You can now assign expiration dates to each key, for better security governance and compliance.
Access token support
We now support token-based flows, with the ability to rotate or revoke tokens independently of the API key.
⚠️ The current API access method remains active for now to ensure backward compatibility. However, this new system will fully replace it by the end of 2025.
This upgrade enables more secure, manageable and auditable API usage, and paves the way for features like OAuth or endpoint-specific access control.