Viewing API Keys
Navigate to the API Keys page for your account:- Personal Account:
/teams/~/api-keys - Team Account:
/teams/[team-slug]/api-keys
Key Information Displayed
Each API key shows the following information:The display name you chose when creating the key
Masked token value (e.g.,
deli_****...****abcd)The full token is only shown once at creation time
Summary of scopes assigned to the key:
- “Full Access” for
["*"] - “X services” for service-level access
- “X scopes” for granular permissions
When the key was created
When the key was last used
Helps identify unused keys for cleanup
Expiration date (or “Never” if no expiration)
Monitoring Usage
Last Used Timestamp
The “Last Used” column updates whenever the API key successfully authenticates a request. This helps you:- Identify Active Keys: See which keys are actively in use
- Detect Unused Keys: Find keys that haven’t been used recently
- Security Auditing: Track key usage patterns
- Cleanup Planning: Identify candidates for revocation
Permission Details
Click on any key’s permission summary to view the complete list of scopes:Revoking API Keys
How to Revoke
- Navigate to the API Keys page
- Find the key you want to revoke
- Click the Delete button (trash icon)
- Confirm the deletion
When to Revoke
Revoke keys in these situations:Key Compromise
Key Compromise
If a key has been exposed or leaked:
- Immediately revoke the compromised key
- Create a new key with the same permissions
- Update your applications with the new key
- Review recent usage for suspicious activity
Unused Keys
Unused Keys
If a key hasn’t been used in a long time:
- Verify the key is truly unused
- Check with your team if it’s a team key
- Revoke the key to reduce attack surface
Project Decommissioned
Project Decommissioned
When a project or service is retired:
- Document which keys were used
- Revoke all associated keys
- Remove keys from any documentation
Team Member Departure
Team Member Departure
When a team member leaves:
- Review keys created by the member
- Revoke personal keys if applicable
- Rotate shared keys they had access to
Regular Rotation
Regular Rotation
As part of security best practices:
- Create new keys with same permissions
- Update applications with new keys
- Revoke old keys after verification
- Document rotation date
Key Rotation
Key rotation is a security best practice that involves regularly replacing API keys.Rotation Process
1
Create New Key
Generate a new API key with the same scopes as the old key
2
Update Applications
Update your applications to use the new key
3
Test New Key
Verify the new key works correctly
4
Monitor Old Key
Wait 24-48 hours and monitor “Last Used” timestampIf old key is still being used:
- Identify which service is using it
- Update that service
- Wait and verify again
5
Revoke Old Key
Once confirmed the old key is no longer used:
- Revoke the old key
- Monitor for any errors
- Document the rotation
Rotation Schedule
Recommended rotation frequencies:| Environment | Frequency | Reason |
|---|---|---|
| Development | 30-90 days | Frequent changes, lower risk |
| Staging | 60-180 days | Balance of security and stability |
| Production | 90-365 days | Stability critical, planned rotations |
| CI/CD | 60-180 days | Automated environments easier to update |
These are recommendations. Adjust based on your organization’s security policies.
Troubleshooting
Key Not Working
If an API key stops working:- Check Expiration: Verify the key hasn’t expired
- Verify Scopes: Ensure the key has required permissions
- Test Authentication: Try a simple API call
- Check Last Used: See if it’s being used at all
- Review Logs: Check application logs for error messages
Permission Denied
If you get permission errors:- Review Scopes: Check the key’s scope list
- Verify Endpoint: Ensure the endpoint matches a scope
- Check Wildcards: Understand wildcard coverage
- Contact Support: If scope seems correct but fails
Cannot Delete Key
If you cannot delete a key:- Check Permissions: Ensure you have admin rights
- Verify Ownership: Confirm the key belongs to your account
- Try Again: Temporary network issues may occur
Best Practices Summary
Regular Audits
Review API keys monthly for unused or expired keys
Descriptive Names
Use names that identify purpose and version (e.g., “Production v2”)
Monitor Usage
Track “Last Used” to identify active and inactive keys
Rotate Regularly
Implement key rotation based on environment risk level
Document Keys
Maintain internal documentation of key purposes
Revoke Promptly
Remove unused keys immediately to reduce attack surface
