Authorization
Authentication System
The platform employs bearer token security to control API access and verify user permissions. This authentication standard applies to both inference endpoints and compute deployment services, creating a unified access control system. By implementing token-based authentication, the platform eliminates the need for session management and maintains stateless API interactions.
Getting Your Access Token
Before making API calls to inference or compute services, you must first acquire an authentication token. These tokens act as secure credentials that validate your identity when accessing platform resources.
Token Creation Process
Navigate to Management -> Create a new API Key
Select the Create API key option
The generated key functions as your authentication token for all inference and compute API endpoints
Implementing Token Authentication
Include your authentication token in the Authorization header for every API request to inference and compute services. This token validates your access rights for each endpoint call.
Important Security Guidelines
Protect your token from unauthorized access and avoid embedding it in frontend applications
Generate a replacement token immediately if you believe your current token may be exposed
Last updated