Personal API keys vs MCP API keys
Probo has two kinds of API keys:| Type | Purpose | Endpoint |
|---|---|---|
| Personal API key | Programmatic access to the Probo GraphQL API. Carries the same permissions as your user account. | /api/console/v1/graphql |
| MCP API key | Used by AI assistant integrations (Claude, Cursor, etc.) to call Probo’s Model Context Protocol server. | /api/mcp/v1 |
Creating an API key
Open API keys settings
Click your avatar or account name in the top-right corner, then go to Account settings → API keys.
Create a new key
Click Create API key and fill in:
- Name — a label to identify the key (for example,
ci-pipelineormonitoring-script) - Expires at — the date and time when the key expires
Using an API key
Pass the token as aBearer token in the Authorization header of every request:
Permissions
API keys inherit the permissions of the user who created them. There are no separate key-level scopes. If your account has the Admin role, API calls made with your key have Admin-level access.For least-privilege automation, create a dedicated Probo account with the minimum required role, and generate the API key from that account.
Key expiry
Every API key has an expiry date set at creation. Once a key expires, all requests using it return401 Unauthorized. Probo marks expired keys with an idle-timeout reason and they can no longer be used.
You can check the Last used at timestamp on each key to see when it was last active.
Revoking an API key
Any in-flight requests using a revoked key fail immediately with
401 Unauthorized.
Security best practices
Rotate keys regularly
Rotate keys regularly
Set short expiry windows and replace keys on a regular schedule. Treat API keys the same as passwords.
Never commit keys to source control
Never commit keys to source control
Store API keys in environment variables, secrets managers (AWS Secrets Manager, HashiCorp Vault, GitHub Secrets), or your CI/CD platform’s secret store — never hardcoded in code or config files.
Use minimal permissions
Use minimal permissions
Create a dedicated account with only the role required for the automation. Avoid using Owner or Admin keys for automated workflows when a lower-privilege role is sufficient.
Revoke unused keys
Revoke unused keys
Audit your keys periodically. Revoke any key that is no longer in use or that you cannot identify.
Monitor last-used timestamps
Monitor last-used timestamps
The Last used at field on each key helps you identify stale or unexpected usage.
API reference
Explore the full Probo API.
MCP integration
Connect AI assistants to Probo using the MCP API.