Every Enkryptify API request must be authenticated. You have two options:Documentation Index
Fetch the complete documentation index at: https://docs.enkryptify.com/llms.txt
Use this file to discover all available pages before exploring further.
- Use an
ek_live_token directly: the simplest path. Recommended for most workloads. - Exchange it for a JWT: recommended only for very high request rates.
Get an API token
Create a token from the Credentials page in your dashboard. Tokens start withek_live_ and are shown only once at creation. Store the value in your CI provider’s secret storage (GitHub Actions secrets, GitLab CI variables, etc.). Never commit it to source.
See API tokens for full guidance on rotation, scoping and revocation.
Option 1: Use the token directly
Pass the token in theAuthorization header on every request:
Option 2: Exchange for a JWT
For very high request volumes, exchange the token once for a 15-minute JWT and reuse it. The JWT is validated statelessly with no database hit per request.Exchange
Use the JWT
Send the JWT in theAuthorization header for subsequent calls:
expiresIn runs out, exchange again. The exchange endpoint is rate-limited to 10 requests per minute per token, so cache the JWT. Don’t exchange on every request.
Scopes and permissions
Tokens carry the permissions you set when you created them:- Permission:
readorread-write. Write operations are rejected for read-only tokens. - Scope: full workspace or limited to specific teams / projects / environments.
- the token’s permission and scope, and
- the underlying user’s workspace role.