Authorization

Authentication System

The platform employs bearer token security to control API access and verify user permissions. This authentication standard applies to both inference endpoints and compute deployment services, creating a unified access control system. By implementing token-based authentication, the platform eliminates the need for session management and maintains stateless API interactions.

Getting Your Access Token

Before making API calls to inference or compute services, you must first acquire an authentication token. These tokens act as secure credentials that validate your identity when accessing platform resources.

Token Creation Process

  1. Navigate to Management -> Create a new API Key

  2. Select the Create API key option

  3. The generated key functions as your authentication token for all inference and compute API endpoints

Implementing Token Authentication

Include your authentication token in the Authorization header for every API request to inference and compute services. This token validates your access rights for each endpoint call.

Important Security Guidelines

  • Protect your token from unauthorized access and avoid embedding it in frontend applications

  • Generate a replacement token immediately if you believe your current token may be exposed

Last updated