ApiKeys
Web origins
Enhance the security of your apikeys incorporating URL restrictions. When you apply a URL restriction to an apikey, it will exclusively function for requests originating from the specified URLs. Apikeys lacking restrictions will accommodate requests from any URL.
ApiKey Metrics
Monitor the usage statistics for all your apikeys within a specified timeframe on your Metrics page.
Vulnerability
ApiKeys, are vulnerable to risks if not handled securely. Exposure of can result in unauthorized data access, system manipulations, financial losses, and damage to your reputation.
To ensure their protection:
-
Store keys away from code: Keep ApiKeys separate from your code, preferably stored in environmental variables.
-
Rotate keys regularly: Regularly change ApiKeys and remove outdated ones to reduce the risk of unauthorized access.
- Avoid exposure in public channels or repositories: Refrain from exposing API keys in public channels or repositories to prevent unauthorized access.