API Key Authentication
API keys provide a simple way to authenticate requests to the FLTR API. They’re perfect for server-side applications, scripts, and integrations.Quick Start
1
Generate an API Key
- Log in to www.tryfltr.com
- Navigate to Settings → API Keys
- Click Create API Key
- Give your key a descriptive name
- Copy and save the key securely
2
Use the API Key
Include your API key in the Authorization header:
3
Test Your Key
Verify the key works by listing your datasets:
API Key Format
FLTR API keys follow this format:- Prefix:
fltr_identifies the key as a FLTR credential - Type:
skindicates a secret key - ID: Random alphanumeric string
Using API Keys
In HTTP Requests
Include the API key in theAuthorization header with the Bearer scheme:
Environment Variables
Store API keys in environment variables, never hard-code them:SDK Usage
Official SDKs are coming soon. For now, use the REST API directly with your preferred HTTP client.
Key Management
Creating Keys
You can have multiple API keys for different purposes: Recommended naming conventions:production-api- Production serverstaging-api- Staging environmentci-cd-pipeline- Automated testingzapier-integration- Zapier workflows
- Create separate keys for dev, staging, and production
- Easier to rotate compromised keys
- Better audit trail in logs
Rotating Keys
Rotate API keys regularly for security:1
Create New Key
Generate a new API key in the dashboard with the same name + date:
2
Update Applications
Deploy the new key to your applications one environment at a time:
- Staging first
- Test thoroughly
- Then production
3
Monitor Usage
Verify the old key shows zero usage after migration
4
Revoke Old Key
Delete the old key once you’ve confirmed the new key works
Revoking Keys
Revoke compromised keys immediately:- Go to Settings → API Keys
- Find the compromised key
- Click Delete or Revoke
- Generate a new key to replace it
- ✅ Key accidentally committed to GitHub
- ✅ Key shared via insecure channel
- ✅ Employee with access leaves
- ✅ Suspected unauthorized access
- ✅ Compliance requirements
Rate Limits
API key requests are limited to 1,000 requests per hour per account.Checking Your Limit
Response headers show your current rate limit status:X-RateLimit-Limit: Total requests allowed per hourX-RateLimit-Remaining: Requests remaining in current windowX-RateLimit-Reset: Unix timestamp when limit resets
Handling Rate Limits
When you exceed the limit, you’ll receive a 429 error:Increasing Limits
Need more than 1,000 requests per hour?Upgrade to OAuth
Get 15,000 requests/hour with OAuth 2.1
Contact Sales
Enterprise plans with custom limits
Security Best Practices
✅ Do’s
Store keys in environment variables
Store keys in environment variables
Never hard-code API keys in your source code:
Use different keys per environment
Use different keys per environment
Separate keys for development, staging, and production:
Rotate keys regularly
Rotate keys regularly
Set up a key rotation schedule:
- Every 90 days for production keys
- After employee departures
- After security incidents
Use .gitignore for .env files
Use .gitignore for .env files
Prevent accidental commits:
Implement key scanning
Implement key scanning
Use tools to detect leaked keys:
- GitHub Secret Scanning
- GitGuardian
- TruffleHog
- Pre-commit hooks
❌ Don’ts
- ❌ Commit keys to version control (Git, SVN, etc.)
- ❌ Embed keys in client-side JavaScript
- ❌ Share keys via email, Slack, or chat
- ❌ Use the same key across multiple projects
- ❌ Post keys in GitHub issues or Stack Overflow
- ❌ Store keys in plain text files on servers
Compromised Keys
If you accidentally expose an API key:1
Revoke Immediately
Go to Settings → API Keys and delete the compromised key
2
Generate New Key
Create a replacement key with a new name
3
Update Applications
Deploy the new key to all services using the old key
4
Audit Access
Check logs for suspicious activity with the compromised key
5
Notify Team
Alert your team and review security practices
Troubleshooting
Invalid API Key Error
- Key was revoked or deleted
- Incorrect key format
- Missing “Bearer” prefix
- Extra whitespace in key
Key Not Working After Creation
Wait 5-10 seconds after creating a key for it to propagate across our systems.Multiple Keys Not Increasing Limit
Rate limits are per account, not per key. Creating multiple API keys doesn’t increase your rate limit from 1,000 requests/hour. To get higher limits, use OAuth authentication (15,000 req/hour).Integration Examples
Zapier
GitHub Actions
FLTR_API_KEY to your repository secrets.
Docker
FAQ
Can I use multiple API keys?
Can I use multiple API keys?
Yes, you can create multiple API keys for different services, but they all share the same 1,000 req/hour rate limit.
Do API keys expire?
Do API keys expire?
No, API keys don’t expire automatically. Rotate them manually for security.
Can I restrict API key permissions?
Can I restrict API key permissions?
Not yet. API keys have full access to your account. Use OAuth for scope-based permissions.
What happens to requests when I revoke a key?
What happens to requests when I revoke a key?
All requests using that key will immediately return 401 Unauthorized errors.
Can I see usage per API key?
Can I see usage per API key?
Currently, usage is tracked per account, not per key. Per-key analytics are coming soon.