Storage Usage0%

0MB of 1GB limit

Security

Secure your Integration.

Learn how to authenticate your requests and keep your account safe.

X-API-Key Header

Tempy uses custom headers for authentication. Every request to our API endpoints must include your secret API key in the X-API-Key header.

GET /api/v1/shares HTTP/1.1
Host: tempy.sh
X-API-Key: tempy_your_actual_key_here

Managing Keys

Generate multiple keys for different applications. You can name them to keep track of where they are used.

Revocation

If a key is compromised, you can revoke it instantly from the Settings page. This will immediately block any future requests using that key.

Security Best Practices

  • Never commit your API keys to version control.
  • Use environment variables to store keys in your server-side code.
  • Rotate your keys periodically to minimize the impact of potential leaks.
  • If you suspect a leak, revoke the key immediately.