API keys let you authenticate requests to iBlueprint outside of the browser — whether you are running the CLI, integrating iBlueprint into a script, or making direct API calls from your own application. Each key is scoped to your user account and acts as a Bearer token that the iBlueprint API verifies on every request.Documentation Index
Fetch the complete documentation index at: https://docs.iblueprint.ai/llms.txt
Use this file to discover all available pages before exploring further.
Creating an API key
Open API Keys settings
Click your avatar in the top-right corner, select Settings, then choose API Keys from the left sidebar.
Create a new key
Click Create API key, enter a descriptive name (for example,
CI pipeline or local dev), and confirm.Using your API key
With the iBlueprint CLI
Set the key as an environment variable before running CLI commands:In HTTP requests
Pass the key as aBearer token in the Authorization header:
Rotating a key
If you suspect a key has been compromised, rotate it immediately:- Go to Settings → API Keys.
- Find the key you want to rotate and click Revoke.
- Create a new key and update all places where the old key was used.
Revoking a key
To permanently revoke a key:- Go to Settings → API Keys.
- Click the … menu next to the key and select Revoke.
403 Forbidden response.
Security best practices
Never commit keys to source control
Never commit keys to source control
Store API keys in environment variables or a secrets manager (such as AWS Secrets Manager, HashiCorp Vault, or your CI provider’s secret store). Add
.env files to your .gitignore to prevent accidental commits.Use descriptive key names
Use descriptive key names
Name each key after its intended use (for example,
GitHub Actions, staging server, local dev). This makes it easy to identify and revoke the right key if you need to rotate credentials for a specific environment.Use one key per integration
Use one key per integration
Avoid reusing the same key across multiple applications or environments. Separate keys let you revoke access for a single integration without disrupting others.
Set rate limits where possible
Set rate limits where possible
iBlueprint supports per-key rate limiting (requests per hour and per day). Use this to cap how many requests a key can make, reducing the blast radius if a key is misused.
