Skip to content

Authentication

View Markdown llms-full.txt

The Rigyd API authenticates every request with a single header:

Authorization: Bearer rgyd_live_<43-char-token>

That’s it. No OAuth, no signing, no expiring access tokens to refresh.

Mint an API key in app.rigyd.com under Settings → API Keys. Click Create key, give it a name (e.g. production-backend), and optionally set an expires_at date.

The plaintext token is shown once at creation time. Store it in a secret manager — Rigyd only keeps a SHA-256 hash, so we cannot recover it for you.

EnvironmentPrefixExample
Productionrgyd_live_rgyd_live_a1b2c3... (43 chars)
Otherrgyd_test_rgyd_test_a1b2c3... (43 chars)
Terminal window
curl https://api.rigyd.com/api/conversions \
-H "Authorization: Bearer rgyd_live_..."
SituationStatusBody
Missing Authorization header401{ "error": "Authentication required" }
Unknown / revoked / expired key401{ "error": "Invalid API key" }
Key valid but no credits left402{ "error": "Insufficient credits" }

See Errors for the full table.

Both happen in app.rigyd.com → Settings → API Keys:

  • Rotate: create a new key, ship it, then revoke the old one.
  • Revoke immediately if a key leaks — every authenticated request after the revoke call returns 401.

The Rigyd API does not currently expose key management programmatically by design — a leaked key cannot mint or revoke other keys.