API Keys
Scoped tokens for scripts, CLI sessions, tool integrations, and Genies. The way anything outside the browser talks to Fibe.
Family scopes
First-level scoping: by family and action. An API key reads or manages a category — Marquees, Props, Playspecs, Playgrounds, Templates, Agents, Artefacts, Secrets, Webhooks, Job ENV entries, etc.
- read — list and view.
- manage — create, update, delete.
- narrow scope (e.g.
launch:write) — single action across a family.
Pick the narrowest scope that gets the job done.
Granular resource restriction
Narrow a family scope further to a specific list of resources. A key with "manage Secrets" can be restricted to two Secrets by ID; it has no access to any other Secret.
Safe to hand to a single integration: that integration sees exactly the resources you intended.
Resource ownership is validated at save time. You can't grant a key access to resources you don't own.
Example: CI key
- CI launches one specific Playspec.
- Scope:
launch:writerestricted to[playspec-id-42]. - The key launches Playspec 42. Cannot launch anything else. Cannot read other Playspecs.
Create a key
Fields:
- Label — your reference (e.g.
CI/CD Pipeline,Local Dev). Required. - Scopes — at least one required.
- Expires at — optional. Blank = no expiry. Set a date for auto-expire.
- Restrict to specific resources — optional granular restriction.
- For agents (unencrypted) — store unencrypted for direct Genie access. Only check if a Genie needs to read the token at runtime.
Secret shown once at creation. Copy immediately. Cannot be retrieved later.
Manage existing keys
Per-key actions:
- Rotate — issue a new secret. Old secret expires immediately. Update the consumer before rotating.
- Expire now — kill the key immediately.
- Delete — permanent.
Card metadata: created time, last used, scopes, restrictions, status.
Agent keys (unencrypted)
Genie processes sometimes need the token in their environment. For those, mark the key "For agents (unencrypted)" at creation. The token is stored unencrypted so the Genie can read it on launch. Anyone with account access can also read it.
Treat agent keys as more sensitive. Rotate aggressively. Combine with granular restriction so the Genie only has access to what it needs.
Lifecycle & safety
- Raw token shown once at creation. Copy then, or rotate.
- Set an expiration so old keys age out.
- Revoke at any time; future calls fail immediately.
- Managing API keys requires 2FA re-authentication.
FAQ
Keys after account deletion?
Deleting your account revokes every key it owns immediately.
Token format?
Long opaque string. Treat like a password. Don't log, commit, or paste into chat.
Scope a key by IP address?
Not today. Use a rate-limited, narrowly-scoped key and rotate it regularly.
Lost the raw token?
Cannot be recovered. Rotate the key — gives you a new token and stops the old one.
Related
- Security & Sessions — required to manage keys.
- Webhooks — the read-side counterpart.
- Secret Vault — credentials your services use, not for talking to Fibe itself.
- SDK → Authentication — wiring a key into the CLI.