With the flip of a switch, you can revoke a key or access token.
Configure real-time callbacks when specific events occur on an API key or access token.
Setup granular rate limiting on each key to prevent your app or API from being overwhelmed. Read our in-depth article on rate limiting best practices.
Every month you receive an email telling you who is using the keys, and where. In cases of anomaly detection, the platform will alert you of the problem and how to solve it as they occur.
Secure your API with best-in-class API Key management, team access and environment controls, plus mission-critical monitoring analytics.
Yes! We love Indie hackers and supporting the start-up community. Therefore, we have a free Indie tier, which enables you to launch one project for free.
Our Solo package comes with 2 projects. You can easily upgrade to our pro package if you require additional projects. Most small businesses and indie hackers manage on our solo package.
We ask for your credit card to allow your membership to continue after your free trial, should you choose not to cancel. This also allows us to reduce fraud and prevent multiple free trials for one person. This helps us deliver better service and deliverability for all of our customers.
Changing plans is really simple. You can upgrade or downgrade your plan by going to your account settings. If you are upgrading to a higher plan, you will be prorated the difference.
This depends on your tech stack and user case. For a basic API, we would recommend creating one project for your production environment and one project for all your test/local environments.
Yes. Please contact our customer support team to discuss options around how we can work together on integrating The Auth API API Key Management solution together.
Please contact us via the chat message and state you are a start-up. We can talk you through our current offering.
We provide a 35% discount to registered non-profit organizations and registered charities. In both cases, we require the following information to determine your eligibility:
Please contact us via the chat message and state you are a charity with your charity details.
The general use of an API key is to identify the user, developer, or program attempting to access a website. It can help break development silos and will typically be accompanied by a set of access rights that belong to the API the key is. associated with. Read more about API Keys in this article.
Secure API Key cryptology is complicated and time-consuming.
The Auth API takes the risk out of building a robust key store with lifecycle management, and bad-actor detection. The platform has been audited by 3rd party industry-leading security firms. Work out the cost of building your own solution with our calculator.