API Keys
SaveGate uses API keys to authenticate requests. You can obtain your API key from the SaveGate Dashboard after creating an account.Create Account
Sign up at savegate.ai/signin
Using Your API Key
Include your API key in the Authorization header of all API requests:Best Practices
Keep Your API Key Secure
Keep Your API Key Secure
- Never commit API keys to version control
- Use environment variables to store keys
- Rotate keys regularly
- Don’t share keys in public forums or chat
Use Environment Variables
Use Environment Variables
Store your API key in environment variables:Then load it in your code:
.env
Python
Node.js
Rotate Keys Regularly
Rotate Keys Regularly
- Generate a new API key periodically
- Update your applications with the new key
- Revoke the old key after migration
- Set up key rotation alerts in your dashboard
Monitor API Usage
Monitor API Usage
- Track API usage in your dashboard
- Set up billing alerts
- Monitor for unusual activity
- Review access logs regularly
API Key Format
SaveGate API keys follow this format:- All keys start with
sk-savegate- - The random string is 32 characters long
- Keys are case-sensitive
Managing API Keys
Creating Additional Keys
You can create multiple API keys for different applications or environments:- Go to your Dashboard
- Navigate to API Keys
- Click “Create New Key”
- Give it a descriptive name (e.g., “Production App”, “Development”)
- Copy and store the key securely
Revoking Keys
If an API key is compromised:- Go to your Dashboard
- Navigate to API Keys
- Find the compromised key
- Click “Revoke” or the delete icon
- The key will be immediately deactivated
Error Handling
Common authentication errors and how to fix them:401 Unauthorized
- API key is missing
- API key is invalid or malformed
- API key has been revoked
429 Rate Limit Exceeded
- Too many requests in a short time period
- Account limits exceeded
Security Recommendations
Use HTTPS Only
Always use HTTPS when making API calls to protect your API key in transit.
Backend Only
Never expose API keys in client-side code (frontend JavaScript, mobile apps).
Principle of Least Privilege
Use separate API keys for different environments and applications.
Monitor Activity
Regularly review API usage logs for suspicious activity.
Example: Secure Setup
Here’s a complete example of a secure setup:- Python
- Node.js
Need Help?
If you’re having trouble with authentication:- Check our troubleshooting guide
- Contact support at [email protected]