Skip to Content
API & IntegrationAuthentication

Authentication

Inspire uses different authentication methods depending on the context.

Web Application

The Inspire web application uses session-based authentication:

  1. User logs in with email and password
  2. A secure session cookie is set
  3. All subsequent requests include the cookie automatically
  4. Sessions expire after 24 hours of inactivity

API Authentication

Ingest Keys

Data ingestion APIs use ingest keys:

Authorization: Bearer ik_live_abc123def456...
  • Prefixed with ik_ for identification
  • Scoped to a specific connector/stream
  • Created and managed in Data Sources
  • Can be rotated without reconfiguring the connector

API Keys (v1 Legacy)

The v1 compatibility API uses legacy API keys:

X-API-Key: your-api-key
  • Managed in Settings > API Keys
  • Existing legacy keys continue to work
  • Scoped to the tenant level

Key Management Best Practices

PracticeWhy
Use separate keys per integrationIsolates access — revoking one key does not break others
Rotate keys periodicallyLimits exposure if a key is compromised
Never commit keys to version controlUse environment variables instead
Use the minimum scope neededIngest keys are scoped to a single stream
Monitor key usageCheck connector logs for unexpected activity

If you suspect a key has been compromised, rotate it immediately in the Inspire settings. The old key is invalidated instantly.

SSO / SAML

SSO and SAML support is planned for a future release. It is not available in the current version.

Last updated on