# Authorization

### **Authentication System**

The platform employs bearer token security to control API access and verify user permissions. This authentication standard applies to both inference endpoints and compute deployment services, creating a unified access control system. By implementing token-based authentication, the platform eliminates the need for session management and maintains stateless API interactions.

### **Getting Your Access Token**

Before making API calls to inference or compute services, you must first acquire an authentication token. These tokens act as secure credentials that validate your identity when accessing platform resources.

### **Token Creation Process**

1. Navigate to **Management -> Create a new API Key**
2. Select the **Create API key** option
3. The generated key functions as your authentication token for all inference and compute API endpoints

### **Implementing Token Authentication**

Include your authentication token in the `Authorization` header for every API request to inference and compute services. This token validates your access rights for each endpoint call.

#### **Important Security Guidelines**

* Protect your token from unauthorized access and avoid embedding it in frontend applications
* Generate a replacement token immediately if you believe your current token may be exposed
