How to authenticate API requests
To securely access Roark’s API endpoints, you need to authenticate your requests using your unique API key. This ensures that only authorized users can interact with our services.
Never expose your API key in client-side code, public repositories, or share it with unauthorized users. If you believe your key has been compromised, regenerate it immediately in the dashboard.
Store API keys securely in environment variables or a secure key management system
Periodically rotate your API keys to maintain security
Follow our guide to generate your API key and start making authenticated requests
How to authenticate API requests
To securely access Roark’s API endpoints, you need to authenticate your requests using your unique API key. This ensures that only authorized users can interact with our services.
Never expose your API key in client-side code, public repositories, or share it with unauthorized users. If you believe your key has been compromised, regenerate it immediately in the dashboard.
Store API keys securely in environment variables or a secure key management system
Periodically rotate your API keys to maintain security
Follow our guide to generate your API key and start making authenticated requests