Bearer authentication
Use theAuthorization header:
Security best practices
Never expose your root key in client-side code or public repositories. Use a backend server to proxy requests for frontend applications.Root key management
Manage root keys in the Unkey dashboard. Best practices:- Use different keys for development, staging, and production.
- Rotate keys regularly.
- Use clear key names.
Key permissions system
Permissions are tuples of:- ResourceType: category of resource (api, ratelimit, rbac, identity)
- ResourceID: specific resource instance
- Action: operation to perform
Available resource types
| Resource type | Description |
|---|---|
api | API resources such as endpoints and keys |
ratelimit | Rate limiting resources and configuration |
rbac | Permission and role management |
identity | User and identity management |

