Overview
RebelFi APIs use API key authentication for programmatic access. API keys provide full access to your organization’s resources.The RebelFi dashboard uses internal JWT authentication for user sessions. This page covers only API key management for
API integration.
API Key Endpoints
Generate and manage API keys for agent and programmatic access.POST /api/core/apikeys/generate
Generate a new API key via the dashboard or API. Headers:The API key is only shown once. Store it securely.
GET /api/core/apikeys
List all API keys for your organization. Headers:The actual API key value is not returned for security. Only metadata is shown.
DELETE /api/core/apikeys/:id
Revoke an API key. Headers:POST /api/core/apikeys/validate
Validate an API key (uses API key authentication). Headers:Usage Example
Security Best Practices
Secure Storage
Secure Storage
DO:
- Store API keys in environment variables
- Use secrets management systems (AWS Secrets Manager, HashiCorp Vault, etc.)
- Encrypt API keys at rest
- Commit API keys to version control
- Include API keys in client-side code
- Share API keys via email or chat
- Log API keys in plain text
Key Rotation
Key Rotation
Rotate API keys regularly (recommended: every 90 days):
- Generate a new API key
- Deploy the new key to your systems
- Verify the new key works correctly
- Revoke the old API key
- Update documentation
Access Control
Access Control
- Create separate API keys for different environments (dev, staging, production)
- Use descriptive names to track key usage
- Revoke API keys immediately if compromised
- Regularly audit API key usage via dashboard