Create API Key
The API key value is only returned once during creation. Store it securely - you won’t be able to retrieve it again.
Request Body
A descriptive name for the API key to help you identify its purpose.Cannot be empty or contain only whitespace.Example:
"Production API Key", "Development Key", "CI/CD Pipeline"Response
Unique identifier for the API key.
The descriptive name of the API key.
The actual API key value. This is only returned when creating the key.
ID of the organization this API key belongs to.
Whether the API key is active. New keys are active by default.
ISO 8601 timestamp of when the API key was created.
ISO 8601 timestamp of when the API key was last updated.
List API Keys
For security reasons, the actual key values are never returned when listing API keys.
Response
Returns an array of API key objects.Unique identifier for the API key.
The descriptive name of the API key.
ID of the organization this API key belongs to.
Whether the API key is active.
ISO 8601 timestamp of when the API key was created.
ISO 8601 timestamp of when the API key was last updated.
Get API Key
Path Parameters
The unique identifier of the API key to retrieve.
Response
Unique identifier for the API key.
The descriptive name of the API key.
ID of the organization this API key belongs to.
Whether the API key is active.
ISO 8601 timestamp of when the API key was created.
ISO 8601 timestamp of when the API key was last updated.
Delete API Key
Path Parameters
The unique identifier of the API key to delete.
Response
Returns the deleted API key object.Unique identifier for the deleted API key.
The descriptive name of the API key.
ID of the organization this API key belonged to.
Will be
false for deleted keys.ISO 8601 timestamp of when the API key was created.
ISO 8601 timestamp of when the API key was last updated.
Authentication
API keys are used to authenticate all requests to the Sendook API. Include your API key in theAuthorization header of each request:
Example Request
Security Best Practices
Secure Storage
Secure Storage
Store API keys in environment variables or secure secret management systems. Never hardcode them in your application code.
Key Rotation
Key Rotation
Regularly rotate your API keys for enhanced security:
- Create a new API key
- Update your applications to use the new key
- Delete the old API key
Separate Environments
Separate Environments
Use different API keys for different environments:
- Development
- Staging
- Production
Monitor Usage
Monitor Usage
Use descriptive names for your API keys to track which keys are used where. This makes it easier to identify and revoke compromised keys.
Error Responses
401 Unauthorized- Missing or invalid API key
- Deleted or inactive API key
- API key doesn’t have permission to access the requested resource