- Permissions and roles
- Custom metadata
- Rate limit configurations
- Identity associations
- Remaining credits
- Recovery settings
Key Generation
- The system attempts to extract the prefix from the original key
- If prefix extraction fails, the default API prefix is used
- Key length follows the API’s default byte configuration (or 16 bytes if not specified)
Original Key Handling
- The original key will be revoked after the duration specified in
expiration - Set
expirationto 0 to revoke immediately - This allows for graceful key rotation with an overlap period
Common Use Cases
- Rotating keys for security compliance
- Issuing replacement keys for compromised credentials
- Creating backup keys with identical permissions
Required Permissions
Your root key must have:api.*.create_keyorapi.<api_id>.create_keyapi.*.encrypt_keyorapi.<api_id>.encrypt_key(only when the original key is recoverable)
Request
The database identifier of the key to reroll.This is the unique ID returned when creating or listing keys, NOT the actual API key token.You can find this ID in:
- The response from
keys.createKey - Key verification responses
- The Unkey dashboard
- API key listing endpoints
^[a-zA-Z0-9_]+$Example: key_2cGKbMxRyIzhCxo1Idjz8qDuration in milliseconds until the ORIGINAL key is revoked, starting from now.This parameter controls the overlap period for key rotation:
- Set to
0to revoke the original key immediately - Positive values keep the original key active for the specified duration
- Allows graceful migration by giving users time to update their credentials
- Immediate revocation:
0 - 1 hour grace period:
3600000 - 24 hours grace period:
86400000 - 7 days grace period:
604800000 - 30 days grace period:
2592000000
86400000Response
The unique identifier for the new key in Unkey’s system.
The full generated API key that should be securely provided to your user.SECURITY WARNING: This is the only time you’ll receive the complete key. Provide it directly to your end user via secure channels.