Security Keys
π§ Philosophy
Modern AI workflows often include external access β such as API integrations, private deployments, and automation scripts. These integrations require a secure and reliable way to authenticate programmatically.
Thatβs why INTELLITHING includes Security Keys β cryptographically signed API tokens that allow external systems to interact with your deployed applications.
Unlike legacy tokens that are hard to rotate or revoke, our approach:
- Is opt-in and scoped to a specific project
- Can be managed from the UI with full visibility
- Integrates tightly with deployment and runtime security
Security Keys are designed to give developers just enough access, with full traceability and governance.
π Key Concepts
Concept | Description |
---|---|
Security Key | A generated, base64-encoded token used to authenticate external requests |
Key ID | A UUID tied to the token, used to identify and manage keys |
Activation Toggle | A workspace-level switch to enable/disable key-based access |
Build Dependency | Key access is only applied after a fresh compile, build, and deploy |
One-time Visibility | The full secret is shown once upon creation β download it securely |
π Key Definitions
- Security Key: The base64 token used in HTTP headers or SDKs to authorize access.
- Key ID: An immutable identifier (UUID) used to track the key in the system.
- Enabled Toggle: A workspace-wide flag that determines whether any key access is allowed.
- Deployment Awareness: Security keys are wired into your deployed containers. Changes to keys require a redeploy.
- Revocation: You can delete a key anytime β it will immediately stop working in the next deployed version.
π§© Security at a Glance
One-line Form
Example Flow
- Create a new key β it shows once.
- Toggle "Enable Security Keys" β this affects all keys.
- Build and deploy β key access is baked into the container.
- Use the key in external requests.
- Revoke key anytime via UI.
βοΈ How Security Keys Fit into INTELLITHING
The Security tab inside Studio is your access hub.
- You generate and manage keys from the Security section of your workspace.
- Each key is tied to a specific workspace β not individual apps or users.
- Keys only work if the "Enable Security Keys" toggle is ON.
- Even with the toggle ON, key access only becomes active after a successful build & deploy.
This ensures your deployments stay secure and predictable β key changes are opt-in and controlled.
π οΈ How to Create and Use a Key
Step-by-step:
-
Go to Security Tab
-
Found under:
Studio βΊ Security
-
Click "Create a new secret key +"
-
Copy or download the key
-
You'll see:
* You wonβt be able to see it again. -
Toggle ON "Enable Security Keys"
-
Found top-right in the Security UI.
-
This allows API access for the current workspace.
-
Rebuild and Deploy
-
Key changes only take effect after a fresh deploy.
-
This applies the updated access settings.
-
Use your key
-
Example HTTP Header:
𧬠Key Behavior and Runtime Model
Behavior | Description |
---|---|
β Created | A new key is stored in the system. You see the full value once. |
β οΈ Enable Toggle OFF | No keys will work, even if built into the container. |
π Build/Deploy Required | A new or toggled key does not take effect until you redeploy. |
ποΈ Deleted Key | The key ID is revoked; removed keys stop working in the next deploy. |
π The deployment process embeds the key state into your running container. π Changes require a new deploy to take effect.
π UI Overview
Section | Purpose |
---|---|
Create a new secret key + |
Opens the key generation modal |
Enable Security Keys |
Master toggle to allow or deny all key usage |
Key Table |
Lists key IDs, creation dates, and last used |
ποΈ (Red bin icon) | Permanently delete a key |
π¨ Best Practices
Tip | Why It Matters |
---|---|
β Download the key on creation | It will never be shown again |
β Enable toggle only when needed | Minimize exposure during inactive periods |
π Re-deploy after changes | Keys only take effect after recompile/build/deploy |
π§ͺ Test with forked deployments | Use fork/test branches before pushing changes to main |
β Never expose or share the key | create individual keys |
π Permissions
Action | Required Role/Permission |
---|---|
View/Create Keys | admin , owner , or moderator |
Enable/Disable Keys | Same as above |
Delete Keys | Same as above |
Regular users cannot create or access keys.
π¬ Summary
- INTELLITHING provides first-class support for secure API keys.
- Keys are tied to the workspace, controlled via a central toggle.
- Changes only take effect after a build and deploy.
- Keys are one-time view only β download them safely.
- The UI makes it easy to create, revoke, and monitor keys without touching infrastructure.