Skip to main content
API keys authenticate your applications to the Guardway gateway. They’re issued and managed in the dashboard, pushed to attached gateways, and used at request time via the Authorization: Bearer <key> header.

Create a key

Go to Settings → API keys and click New key.
New API key
Fill in:
FieldPurpose
NameWhat you’ll see in logs. Use the app name.
TeamBudget and quota inheritance.
Roleadmin, developer, or read-only. Most app keys should be developer.
BudgetHard USD cap; requests are blocked when exceeded.
QuotaRequests per minute + tokens per minute.
Allowed modelsOptional allow-list. Leave empty for all enabled models.
ExpirationOptional. Keys without an expiration never auto-expire.
The secret value is shown once at creation. Copy it into your secrets manager immediately. If you lose it, rotate the key.

Use it

curl https://<your-gateway>/v1/chat/completions \
  -H "Authorization: Bearer <your-key>" \
  -H "Content-Type: application/json" \
  -d '{"model":"gpt-4o-mini","messages":[{"role":"user","content":"hi"}]}'

Rotate and revoke

  • Rotate issues a new secret without invalidating the key id. Old secret stops working immediately — plan a deploy window.
  • Revoke disables the key entirely. All in-flight requests are drained, then blocked.
Both actions are audit-logged on every gateway the key was pushed to.