Overview
All requests to the Yala API must include an API key in thex-api-key header. Keys are environment-specific, scoped to your tenant, and grant access to the resources configured for your organization.
Treat your API keys like passwords. Rotate them periodically and delete keys that are no longer in use.
Obtain keys
- Request sandbox access from [email protected].
- Generate API keys in the Yala dashboard. Each key is associated with a specific environment (sandbox or production).
- Share keys securely with integration partners using a password manager or secret sharing tool.
Send authenticated requests
Rotate keys
- Maintain at least two active keys per environment so you can swap without downtime.
- Update your application to use the new key, then revoke the old key in the dashboard.
- Audit key usage regularly to ensure dormant keys are disabled.
Handling leaked keys
If you suspect a key has been exposed:- Revoke the compromised key immediately from the dashboard.
- Generate a new key and update your applications.
- Contact support with recent request IDs to investigate potential misuse.