Creating Additional API Keys
Your ApexVerify account supports multiple API keys. Creating separate keys for different environments, services, or team members makes it easy to track usage, rotate credentials independently, and limit the blast radius if a key is compromised.
Why use multiple keys?
Use separate keys for production, staging, and development so a leaked dev key never affects your live data.
Assign one key per integration (CRM sync, bulk import job, browser extension) to pinpoint which service is consuming credits.
Give each team member or CI pipeline their own key. Revoking one key doesn’t disrupt other integrations.
Generate a new key, update your config, verify the new key works, then revoke the old one — no downtime required.
Creating a new key
Generate a new key
Click Generate New Key. Enter a descriptive label — this is for your own reference and does not affect how the key works.
Good labels: production-api, staging-etl, ci-pipeline, dev-john
Copy and store the key
The key is shown only once. Copy it immediately and store it in a secret manager (e.g. AWS Secrets Manager, HashiCorp Vault, GitHub Actions secrets, or a .env file outside of version control).
Once you close the modal, the full key value is no longer retrievable from the dashboard.
Key rotation best practices
Recommended rotation schedule: Rotate production API keys every 90 days, or immediately after any suspected exposure. For long-running background jobs, consider rotating on each deployment cycle.
A safe rotation sequence:
- Generate the new key in the dashboard
- Deploy the new key to your production environment (update secret manager / env var)
- Monitor the new key for a short period to confirm it’s working
- Revoke the old key once traffic has fully migrated
Never revoke the old key before the new key is confirmed live — this causes downtime.
Revoking a key
To revoke a key:
- Go to Settings → API Keys in the Dashboard
- Locate the key by its label
- Click Revoke and confirm
Revocation is immediate and irreversible. Any in-flight requests using the revoked key will fail with 401 Unauthorized. Make sure no active integrations depend on the key before revoking. Running batch jobs are not interrupted, but any new requests using that key will be rejected.
