Overview
Reminix uses different authentication methods depending on where your code runs:| Token Type | Prefix | Use Case | Created From |
|---|---|---|---|
| API Key | reminix_sk_ | Server-side API calls | Dashboard |
| Client Token | reminix_ct_ | Browser/client-side calls | Your backend via API |
| Personal Access Token | reminix_pat_ | CLI, scripts, automation | Dashboard |
API Keys are secret keys for server-side use only. Never expose them in browsers or mobile apps. For client-side usage, see Client Tokens.
API Keys (Server-Side)
Your API Key is a secret key — it provides full access to your project and should only be used in server-side code.Getting Your API Key
Sign in to the Dashboard
Go to reminix.com/dashboard and sign in to your account.
Using Your API Key
HTTP Header
Include your API key in theAuthorization header:
Environment Variable
The recommended approach is to use an environment variable:REMINIX_API_KEY:
Explicit Configuration
You can also pass the key directly (useful for testing):Security Best Practices
Never commit API keys to version control
Never commit API keys to version control
Use environment variables or a secrets manager. Add
.env to your .gitignore.Use different keys for different environments
Use different keys for different environments
Create separate keys for development, staging, and production. This limits blast radius if a key is compromised.
Rotate keys periodically
Rotate keys periodically
Regularly rotate your API keys, especially if team members leave or keys may have been exposed.
Use server-side only
Use server-side only
Never expose your API key in client-side code (browser, mobile apps). Make API calls from your backend.
Monitor usage
Monitor usage
Check the dashboard regularly for unexpected usage patterns that might indicate a compromised key.
Key Permissions
API keys have full access to your project’s resources:| Permission | Description |
|---|---|
| Agents | Invoke and chat with all agents |
| Read | View agent configurations and logs |
| Write | Deploy and update agents |
Revoking Keys
If a key is compromised:- Go to Settings → API Keys in the dashboard
- Find the compromised key
- Click Revoke
Client-Side Authentication
For browser-based applications, you cannot use API keys directly — they would be exposed to end users. Instead, use Client Tokens. Client tokens are:- Short-lived (typically 1 hour)
- Created by your backend using your API key
- Scoped with context (e.g., user ID, session ID)
- Safe for browsers — they can only access the Client API
Client Tokens
Learn how to authenticate browser-based applications