Security
Secure your Integration.
Learn how to authenticate your requests and keep your account safe.
X-API-Key Header
Tempy uses custom headers for authentication. Every request to our API
endpoints must include your secret API key in the
X-API-Key
header.
GET /api/v1/shares HTTP/1.1
Host: tempy.sh
X-API-Key: tempy_your_actual_key_here
Host: tempy.sh
X-API-Key: tempy_your_actual_key_here
Managing Keys
Generate multiple keys for different applications. You can name them to keep track of where they are used.
Revocation
If a key is compromised, you can revoke it instantly from the Settings page. This will immediately block any future requests using that key.
Security Best Practices
- Never commit your API keys to version control.
- Use environment variables to store keys in your server-side code.
- Rotate your keys periodically to minimize the impact of potential leaks.
- If you suspect a leak, revoke the key immediately.