Authentication Overview
Request Network API uses API key authentication to secure access to endpoints. This guide covers how to obtain, manage, and use your API keys securely.Getting API Keys
1
Create Account
Sign up for a Request Network account at the Request Portal
2
Generate API Key
Navigate to the API Keys section and create a new API key for your project
3
Configure Environment
Store your API key securely in environment variables
4
Test Connection
Make your first authenticated API call to verify setup
API Key Management
Production Keys
Production Environment:
- Use separate keys for production
- Implement key rotation policies
- Monitor usage and access logs
- Set up rate limiting and alerts
Development Keys
Development Environment:
- Use testnet for development
- Separate keys for each environment
- Team access management
- Testing and debugging tools
Authentication Methods
API Key in Header (Recommended):
Security Best Practices
API Key Security
API Key Security
Protect Your API Keys:
- Never commit API keys to version control
- Use environment variables for key storage
- Implement key rotation policies
- Monitor for unauthorized usage
- Use different keys for different environments
Network Security
Network Security
Secure Communication:
- Always use HTTPS for API calls
- Implement request signing for sensitive operations
- Use webhook signature verification
- Implement rate limiting on your endpoints
Access Control
Access Control
Manage Access:
- Use principle of least privilege
- Implement role-based access control
- Regular access audits
- Immediate revocation of compromised keys
Rate Limits
Rate Limiting InformationCurrent rate limits apply to API usage. Contact support for enterprise rate limit increases.
Standard Limits
Default Rate Limits:
- 100 requests per minute
- 1,000 requests per hour
- 10,000 requests per day
Webhook Limits
Webhook Rate Limits:
- 50 webhook deliveries per minute
- Exponential backoff for retries
- Maximum 5 retry attempts