Authentication
Raptor Data uses API keys to authenticate requests. All API requests must include a valid API key in theAuthorization header.
Creating an API Key
- Sign in to your Raptor Data Dashboard
- Navigate to Settings → API Keys
- Click Create API Key
- Give your key a descriptive name (e.g., “Production”, “Development”, “CI/CD”)
- Copy the API key immediately
Using Your API Key
TypeScript SDK
REST API
Include your API key in theAuthorization header:
Environment Variables
Store your API key in environment variables to keep it secure:Node.js / TypeScript
Next.js
Browser-Based Apps
Recommended Architecture:API Key Management
Regenerating API Keys
If your API key is compromised:- Go to Dashboard → Settings → API Keys
- Click Regenerate on the compromised key
- Update your application with the new key
- The old key is immediately deactivated
Multiple API Keys
Create multiple API keys for different environments:- Production: For your live application
- Development: For local development
- Staging: For staging environment
- CI/CD: For automated testing pipelines
Deleting API Keys
To remove an API key:- Go to Dashboard → Settings → API Keys
- Click Delete on the key you want to remove
- Confirm deletion
Rate Limits
Rate limits are enforced per API key and depend on your plan:| Plan | Requests per Minute | Concurrent Processing |
|---|---|---|
| Free | 10 | 1 |
| Basic | 100 | 3 |
| Plus | 500 | 10 |
| Premium | 2,000 | 25 |
| Business | 5,000 | 50 |
| Enterprise | Custom | Custom |
Handling Rate Limits
When you exceed rate limits, the API returns a429 Too Many Requests status:
Security Best Practices
Never commit API keys to version control
Never commit API keys to version control
Always use environment variables and add
.env to your .gitignore:Use different keys for different environments
Use different keys for different environments
Create separate API keys for development, staging, and production. This allows you to rotate keys without affecting other environments.
Rotate keys regularly
Rotate keys regularly
Periodically regenerate your API keys as a security best practice, especially for production environments.
Monitor API key usage
Monitor API key usage
Check the Last Used timestamp in your dashboard to detect unauthorized usage:
- If a key shows recent activity but you haven’t used it, regenerate it immediately
- Delete unused keys to reduce your attack surface
Use server-side proxies for browser apps
Use server-side proxies for browser apps
Never expose API keys in client-side JavaScript. Always proxy requests through your backend API.
Implement IP allowlisting (Enterprise)
Implement IP allowlisting (Enterprise)
Enterprise plans can restrict API keys to specific IP addresses or CIDR ranges.
Troubleshooting
401 Unauthorized
- Verify your API key is correct and hasn’t been regenerated
- Check that the
Authorizationheader is formatted correctly:Bearer YOUR_KEY - Ensure the API key hasn’t been deleted
403 Forbidden
429 Rate Limit Exceeded
- Wait for the rate limit window to reset (60 seconds)
- Upgrade your plan for higher rate limits
- Implement exponential backoff in your application