Common Use Cases
- Generate keys for new user registrations
- Create additional keys for different applications
- Issue keys with specific permissions or limits
Required Permissions
Your root key needs one of:api.*.create_key(create keys in any API)api.<api_id>.create_key(create keys in specific API)
Request
The API namespace this key belongs to. Keys from different APIs cannot access each other.Pattern:
^[a-zA-Z0-9_]+$Example: api_1234abcdAdds a visual identifier to the beginning of the generated key for easier recognition in logs and dashboards. The prefix becomes part of the actual key string (e.g.,
prod_xxxxxxxxx).Avoid using sensitive information in prefixes as they may appear in logs and error messages.Length: 1-16 charactersPattern: ^[a-zA-Z0-9_]+$Example: prodSets a human-readable identifier for internal organization and dashboard display. Never exposed to end users, only visible in management interfaces and API responses.Avoid generic names like “API Key” when managing multiple keys for the same user or service.Length: 1-255 charactersExample:
Payment Service Production KeyControls the cryptographic strength of the generated key in bytes. Higher values increase security but result in longer keys.The default 16 bytes provides 2^128 possible combinations, sufficient for most applications. Consider 32 bytes for highly sensitive APIs.Range: 16-255Example:
24Links this key to a user or entity in your system using your own identifier. Returned during verification to identify the key owner without additional database lookups.Essential for user-specific analytics, billing, and multi-tenant key management. Use your primary user ID, organization ID, or tenant ID for best results.Length: 1-255 charactersPattern:
^[a-zA-Z0-9_.-]+$Example: user_1234abcdStores arbitrary JSON metadata returned during key verification for contextual information. Eliminates additional database lookups during verification, improving performance for stateless services.Avoid storing sensitive data here as it’s returned in verification responses. Large metadata objects increase verification latency and should stay under 10KB total size.Example:
Assigns existing roles to this key for permission management through role-based access control. Roles must already exist in your workspace before assignment.During verification, all permissions from assigned roles are checked against requested permissions.Example:
["api_admin", "billing_reader"]Grants specific permissions directly to this key without requiring role membership. Wildcard permissions like
documents.* grant access to all sub-permissions including documents.read and documents.write.Direct permissions supplement any permissions inherited from assigned roles.Example: ["documents.read", "documents.write", "settings.view"]Sets when this key automatically expires as a Unix timestamp in milliseconds. Verification fails with
code=EXPIRED immediately after this time passes.Omitting this field creates a permanent key that never expires. Keys expire based on server time, not client time, which prevents timezone-related issues.Essential for trial periods, temporary access, and security compliance requiring key rotation.Example: 1704067200000Controls usage-based limits through credit consumption with optional automatic refills. Unlike rate limits which control frequency, credits control total usage with global consistency.Essential for implementing usage-based pricing, subscription tiers, and hard usage quotas.
The initial number of credits available for this key.
Defines time-based rate limits that protect against abuse by controlling request frequency. Unlike credits which track total usage, rate limits reset automatically after each window expires.Multiple rate limits can control different operation types with separate thresholds and windows.Example:
Controls whether the key is active immediately upon creation. When set to
false, the key exists but all verification attempts fail with code=DISABLED.Useful for pre-creating keys that will be activated later or for keys requiring manual approval.Controls whether the plaintext key is stored in an encrypted vault for later retrieval. When true, allows recovering the actual key value using
keys.getKey with decrypt=true.When false, the key value cannot be retrieved after creation for maximum security. Only enable for development keys or when key recovery is absolutely necessary.Response
The unique identifier for this key in Unkey’s system. This is NOT the actual API key, but a reference ID used for management operations like updating or deleting the key.Store this ID in your database to reference the key later. This ID is not sensitive and can be logged or displayed in dashboards.Example:
key_2cGKbMxRyIzhCxo1Idjz8qThe full generated API key that should be securely provided to your user.SECURITY WARNING: This is the only time you’ll receive the complete key - Unkey only stores a securely hashed version. Never log or store this value in your own systems; provide it directly to your end user via secure channels. After this API call completes, this value cannot be retrieved again (unless created with
recoverable=true).Example: prod_2cGKbMxRjIzhCxo1IdjH3arELti7Sdyc8w6XYbvtcyuBowPT