Overview
All requests to the Yala API must include an API key in thex-api-key header. Keys are environment-specific, scoped to your tenant, and grant access to the resources configured for your organization.
Treat your API keys like passwords. Rotate them periodically and delete keys that are no longer in use.
Obtain keys
- Request sandbox access from your Yala relationship manager or developers@useyala.com.
- Generate API keys in the Yala dashboard. Each key is associated with a specific environment (sandbox or production).
- Share keys securely with integration partners using a password manager or secret sharing tool.
Newly generated API keys can take up to 20-30 minutes to fully propagate. During this window, requests may return
403 Forbidden. Wait a few minutes and retry.Optional request headers for debugging
You may send an optionalx-request-id (or x-correlation-id) header on any request. If you do, we will use the same value in our logs and responses. Sending it helps speed up support and debugging when you contact us.
Send authenticated requests
Rotate keys
- Maintain at least two active keys per environment so you can swap without downtime.
- Update your application to use the new key, then revoke the old key in the dashboard.
- Audit key usage regularly to ensure dormant keys are disabled.
Handling leaked keys
If you suspect a key has been exposed:- Revoke the compromised key immediately from the dashboard.
- Generate a new key and update your applications.
- Contact support with recent request IDs to investigate potential misuse.