API Keys
API keys provide secure programmatic access to your AstraCollab storage. Learn how to create, manage, and secure your API keys effectively.Creating API Keys
Basic API Key Creation
Create a new API key with default permissions:API Key with Specific Permissions
Create keys with granular permissions:Available Permissions
| Permission | Description | Use Case |
|---|---|---|
files:read | Read files and metadata | View-only applications |
files:write | Upload, update, delete files | File management apps |
folders:read | List and view folders | File browsers |
folders:write | Create, update, delete folders | Organization tools |
keys:read | View API keys | Key management dashboards |
keys:write | Create and manage API keys | Administrative tools |
billing:read | View billing information | Usage monitoring |
admin | Full administrative access | System administration |
Managing API Keys
Listing API Keys
View all your API keys:Key Information
Each API key includes detailed information:Updating API Keys
Update key properties (except the key value itself):Revoking API Keys
Revoke keys to disable access:Security Best Practices
Key Naming Conventions
Use descriptive names that indicate the purpose:Permission Management
Follow the principle of least privilege:Key Rotation
Regularly rotate your API keys:Expiration Management
Set appropriate expiration dates:Usage Monitoring
Key Usage Analytics
Monitor how your keys are being used:Usage Alerts
Set up monitoring for unusual activity:Environment Management
Environment-Specific Keys
Create different keys for different environments:Key Configuration Management
Store and manage key configurations securely:Emergency Procedures
Emergency Key Revocation
For security incidents:Key Recovery
Recover from key compromise:Best Practices Summary
Creation
- Use descriptive names
- Follow least privilege principle
- Set appropriate expiration dates
- Document key purposes
Management
- Regular key rotation
- Monitor usage patterns
- Review permissions periodically
- Keep key inventory updated
Security
- Store keys securely
- Never commit keys to version control
- Use environment variables
Monitoring
- Track key usage
- Set up usage alerts
- Regular security audits
- Monitor for unusual activity