API Keys
Getting Here
Settings > User Management > API Keys
User Management - API Keys
The API Keys page under User Management allows you to view, manage, and create API keys for system integrations, access control, and automation.
Getting Here
Navigate to:
Settings > User Management > API Keys
Page Overview
Top Action Buttons
-
ADD API KEY
- Description: Initiates the creation of a new API key.
- Behavior: Opens a form to define API key details, including roles and permissions.
-
API SHARED SECRET
- Description: Allows retrieval or creation of a shared secret for API integrations.
API Keys Table
The table provides an overview of all API keys and their details. The table contains the following columns:
Field | Description |
---|---|
Name / Desc | The name or description of the API key. Includes additional details such as its purpose or usage context. |
Role | The role associated with the API key, defining its permissions. Possible values: ADMIN or READONLY . |
Last Login | The last recorded use of the API key. If never used, displays Never . |
Example Table Output
Name / Desc | Role | Last Login |
---|---|---|
tcross_ro | READONLY | 2024-07-29 18:59:11 |
srdkn | ADMIN | 2024-12-12 19:51:30 |
rharman_automation_rw | ADMIN | Never |
rharman_automation_ro | READONLY | 2024-12-16 13:00:02 |
productreport | READONLY | 2024-12-09 16:21:36 |
djm_dash | ADMIN | 2024-09-27 20:02:11 |
chris_ro | READONLY | 2024-01-08 23:07:29 |
accountd | ADMIN | 2024-12-16 19:47:38 |
Table Features
-
Name / Desc
- Displays the API key name, with a description or usage notes.
-
Role
- Defines access permissions:
ADMIN
: Full administrative privileges.READONLY
: Limited to read-only actions.
- Defines access permissions:
-
Last Login
- Shows the most recent date and time the API key was used.
- If the key has not been used,
Never
is displayed.
Actions
- Add API Key: Use this to create and configure new API keys.
- View Shared Secret: Access or configure the shared API secret.
Notes
- Regularly review API keys to ensure unused keys are deleted and active keys have appropriate roles.
- API keys with
ADMIN
permissions should be used cautiously to prevent unintended access. - Monitor the Last Login column to identify and clean up inactive or unused API keys.
The API Keys Page enables secure and efficient management of API credentials, providing clear visibility into roles, usage, and access control.
Updated 5 days ago