API Keys
Create and manage API keys for programmatic access to Keva
API keys enable programmatic access to Keva's REST API. Use them for integrations, automations, and custom workflows while maintaining security best practices.
Overview
Keva API keys:
- Use Bearer token authentication
- Are prefixed with
keva_live_for easy identification - Are scoped to your organization
- Support granular permissions
- Are logged in the audit trail
Creating an API Key
Generate a New Key
- Navigate to Settings > API Keys
- Click Create Key
- Enter a descriptive name (e.g., "Zapier Integration")
- Select permissions for the key
- Click Create
Copy Your Key
The full API key is displayed only once. Copy it immediately:
keva_live_sk_a1b2c3d4e5f6...Store the key securely. If lost, you must create a new key.
Key Format
Keva API keys follow this format:
keva_live_sk_{random_string}keva_live_- Identifies the key as a Keva production keysk_- Secret key identifier{random_string}- Cryptographically secure random characters
Using API Keys
Authentication Header
Include the key in the Authorization header:
curl -X GET https://api.keva.support/v1/tickets \
-H "Authorization: Bearer keva_live_sk_a1b2c3d4e5f6..."SDK Usage
import { KevaClient } from '@keva/sdk';
const keva = new KevaClient({
apiKey: 'keva_live_sk_a1b2c3d4e5f6...'
});
const tickets = await keva.tickets.list();Managing API Keys
View Keys
The API Keys page shows:
- Key name
- Partial key (last 4 characters)
- Created date
- Last used date
- Created by
Rename a Key
- Find the key in the list
- Click the Edit button
- Enter the new name
- Click Save
Delete a Key
- Find the key to delete
- Click Delete
- Confirm deletion
Deleted keys are immediately revoked. Any requests using the key will fail.
Permission Requirements
| Action | Required Permission |
|---|---|
| View API keys | api_keys.view |
| Create keys | api_keys.create |
| Delete keys | api_keys.delete |
Security Best Practices
Use Descriptive Names
Name keys by their purpose:
- "Zapier Production"
- "Internal Dashboard"
- "CI/CD Pipeline"
This helps identify keys for rotation and deletion.
Rotate Keys Regularly
Rotate API keys every 90 days:
- Create a new key
- Update your integration
- Verify the new key works
- Delete the old key
Limit Key Permissions
Create keys with only the permissions needed:
- Read-only integrations: View permissions only
- Ticket creation:
tickets.createonly - Full integration: All required permissions
Monitor Key Usage
Review API key activity regularly:
- Check "Last Used" dates
- Delete unused keys
- Investigate unexpected usage
Never Share Keys
- Don't commit keys to source control
- Use environment variables
- Don't share keys via email or chat
- Use secret management tools
Secure Storage
Store keys in:
- Environment variables
- Secret management services (AWS Secrets Manager, HashiCorp Vault)
- Encrypted configuration files
Never store in:
- Source code
- Plain text files
- Browser storage
- Logs
Rate Limits
API keys are subject to rate limits:
| Plan | Requests/minute |
|---|---|
| Starter | 60 |
| Growth | 300 |
| Scale | 1,000 |
| Enterprise | Custom |
Rate limit headers are included in responses:
X-RateLimit-Limit- Maximum requestsX-RateLimit-Remaining- Requests remainingX-RateLimit-Reset- Reset timestamp
Audit Trail
API key actions are logged:
api_key.created- New key generatedapi_key.deleted- Key revokedapi_key.used- API request made (sampled)
All API requests include the key identifier in audit logs for traceability.