API Keys are long-lived credentials for integrations, bots, and backend services. Unlike sessions (for browsers) or JWT tokens (temporary), API keys persist until you revoke them.Documentation Index
Fetch the complete documentation index at: https://noorle.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
API Key Format
All API keys follow the same format:ak-prefix identifies the string as an API key- Access ID — 32 hex characters (UUID without hyphens), serves as the public identifier
- Secret — appended directly after the access ID, serves as the private credential
Quick Start
Include your API key in theX-API-Key header:
API-Key or Authorization: ApiKey .... See Using API Keys for code examples in Python, JavaScript, and Go.
Authorization: Bearer is for JWT tokens only, not API keys.When to Use API Keys vs JWT
| Use Case | API Key | JWT Token |
|---|---|---|
| Server-to-server integrations | Yes | No |
| CLI tools and scripts | Yes | Yes (device flow) |
| Web applications | No | Yes |
| Long-lived automation | Yes | No (expires) |
| Fine-grained user identity | No | Yes |
How API Keys Are Created
Noorle supports two ways to create API keys: Service Account Keys — The primary method. Create a service account, and an API key is generated automatically. Best for team environments and production services where you need role-based access, audit trails, and key rotation. Direct API Keys — Create API keys directly from account settings. Best for personal development, quick scripts, and testing. Both methods produce the same key format and work identically in API requests. For step-by-step instructions, see Generating API Keys.Scoping and Permissions
API keys are scoped to limit access:- Account-wide keys access all resources — use for trusted internal tools
- Resource-scoped keys access only specific gateways, agents, or resources — recommended for production and third-party integrations
Key Lifecycle
API keys have three states:- Active — Accepts requests, tracked for usage
- Inactive — Disabled but can be re-enabled
- Revoked — Permanently disabled, returns
401 Unauthorized
Security Essentials
- Never hardcode keys — Use environment variables or secret managers
- Rotate regularly — Monthly rotation recommended
- Monitor usage — Track which services use which keys
- Scope narrowly — Separate keys for separate purposes
Next Steps
- Generating and Managing API Keys — Step-by-step guide
- Service Accounts — Create service accounts for production
- Authentication Overview — All auth methods compared