Authentication
API Key · Bearer Token · Scopes
The Evose API uses Bearer Token authentication. Tokens come from organization-level API Keys.
Create an API Key
[Org management · API Management] → New API Key:
| Field | Description |
|---|---|
| Name | Note the use (e.g. marketing-prod-key) |
| Scopes | Restrict accessible resource types |
| Workspace restriction | Specific workspaces only (optional) |
| Expiration | Auto-expire (optional) |
| IP allowlist | Allowed IPs only (optional) |
Usage
Each request carries the Authorization header:
Scopes
| Scope | Includes |
|---|---|
read | List / read resources |
agent:invoke | Invoke Agents |
workflow:invoke | Trigger Workflows |
knowledge:read | Search knowledge bases |
knowledge:write | Upload / delete documents |
admin | Manage resources (create / modify / delete) |
* | All (use with care) |
Public Keys (for the Front End)
Some scenarios need direct front-end calls (such as the JS SDK) — use a public key:
Public keys:
- Allowed only on specific endpoints (chat invocation)
- Restricted by domain allowlist (anti-theft)
- Cannot access management APIs
User Identity
Calls must indicate the end user (for audit, attribution, ACL checks):
Credential Rotation
| Action | Behavior |
|---|---|
| Create new key | Immediately usable |
| Mark old key deprecated | Still works; UI shows red warning |
| Revoke old key | Immediately invalidated |
Recommended rotation: 90 days. Strict compliance: 30 days.