Authentication Overview
Request Network API uses API key authentication to secure access to endpoints. This guide covers how to obtain, manage, and use your API keys securely.Getting API Keys
Create Account
Sign up for a Request Network account at the Request Portal
API Key Management
Production Keys
Production Environment:
- Use separate keys for production
- Implement key rotation policies
- Monitor usage and access logs
- Set up rate limiting and alerts
Development Keys
Development Environment:
- Use testnet for development
- Separate keys for each environment
- Team access management
- Testing and debugging tools
Authentication Methods
- Header Authentication
- Environment Variables
- SDK Configuration
API Key in Header (Recommended):
Optional Headers:
x-client-id: Your client identifier for request trackingOrigin: Required for browser-based requests (CORS)
Security Best Practices
API Key Security
API Key Security
Protect Your API Keys:
- Never commit API keys to version control
- Use environment variables for key storage
- Implement key rotation policies
- Monitor for unauthorized usage
- Use different keys for different environments
Network Security
Network Security
Secure Communication:
- Always use HTTPS for API calls
- Implement request signing for sensitive operations
- Use webhook signature verification
- Implement rate limiting on your endpoints
Access Control
Access Control
Manage Access:
- Use principle of least privilege
- Implement role-based access control
- Regular access audits
- Immediate revocation of compromised keys
Rate Limits
Rate Limiting InformationCurrent rate limits apply to API usage. Contact support for enterprise rate limit increases.
Standard Limits
Default Rate Limits:
- 100 requests per minute
- 1,000 requests per hour
- 10,000 requests per day
Webhook Limits
Webhook Rate Limits:
- 50 webhook deliveries per minute
- Exponential backoff for retries
- Maximum 5 retry attempts