1. Managing your API Keys
The API Key is your primary credential. It must be passed in the header of every request.Generate your Key
Navigate to your Profile and select the Business tab. Under the API Access section, click on Generate. You will be asked to provide a name for the key. We recommend using a descriptive name (e.g., “Main-Production-Server”) to easily identify its purpose later.
Step 3: Identification & Management
After closing the generation modal, you can manage your keys in the dashboard. For your convenience and security, only the last 4 characters of each key are displayed. This allows you to identify which key is being used by which of your services without exposing the full credential. You can revoke (delete) a key at any time if you suspect it has been compromised.
2. Access Control (IP Whitelisting)
As an additional security layer, our API only accepts requests originating from pre-authorized network addresses.Authorize your Infrastructure
In the same API Access tab, locate the IPs Whitelist section. Every server or environment that needs to call the Erysta API must have its public IP address added here.
Technical Implementation
Every request to the Erysta API must be signed with your security credentials. Use the following header to identify your service.| Header | Value | Description |
|---|---|---|
| x-api-key | <YOUR_API_KEY> | Your unique secret API key generated in the dashboard. |