Managing API Keys and Identities
This documentation is for the preview version of the Dev Portal. If you are using the legacy developer portal, please refer to the docs.
When building an API documentation portal, you often need to provide a way for users to authenticate their API requests. This typically involves managing API keys and different authentication identities. However, implementing a secure and user-friendly system for API key management can be complex and time-consuming. Dev Portal provides a powerful solution to this problem through its API Keys and Identities system.
Authentication Providers and API Identities
Authentication providers allow your users to sign in to your documentation portal. API Identities allow your users to authenticate their API requests.
Before diving into API Identities, it's important to understand that Dev Portal separates user authentication from API authentication. Authentication providers handle how users sign in to your documentation portal, while API Identities manage how these users interact with your APIs.
Authentication providers (like Auth0 or custom JWT) handle:
- User authentication for the documentation portal
- Session management
- User authorization and access control
This separation allows you to:
- Use different authentication methods for your portal and APIs
- Manage API access independently of user authentication
- Support multiple API authentication schemes simultaneously
Learn more about authentication providers
Understanding API Identities
API Identities in Dev Portal represent different authentication contexts that can be used to make API requests. These could be different environments (production, staging), different authentication methods (API key, JWT), or different service accounts.
The API Identity Interface
Code(typescript)
Each API Identity consists of:
id
: A unique identifier for the identitylabel
: A human-readable name shown in the UIauthorizeRequest
: A function that modifies requests to include the necessary authentication
Implementing API Identities
In this example, we'll use Auth0 as our authentication provider and implement an API Identity for a demo API.
To add API Identities to your Dev Portal configuration, you need to implement the ApiIdentityPlugin
interface. Here's an example:
Code(typescript)
When implemented, this identity will appear in the Dev Portal playground.
Managing API Keys in UI
Dev Portal provides a built-in UI for managing API keys through its API Keys plugin. This includes functionality for creating, viewing, updating, and deleting API keys. Let's take a look at the API Keys plugin interface:
The API Key Plugin
Code(typescript)
Implementing API Key Management
Here's a step-by-step guide to implementing API key management:
- First, create a service that implements the
ApiKeysPlugin
interface:
Code(typescript)
- Add the API key service to your Dev Portal configuration:
Code(typescript)
Creating a Custom API Key Management Interface
While Dev Portal provides a built-in UI for managing API keys, you might want to create a custom interface that better matches your documentation's design or provides additional functionality. Let's walk through creating a custom API key management page.
1. Create the Custom Page Component
First, create a new file in your src
directory for your custom component:
Code(typescript)
2. Add the Custom Page to Zudoku
Configure your custom page in the Dev Portal configuration file:
Code(typescript)
3. Using the useDev Portal Hook
The useZudoku
hook provides access to all API key management functionality through the apiKeys
object:
Code(typescript)
The hook provides:
keys
: Array of current API keyscreateKey
: Create a new API keydeleteKey
: Delete an existing keyrollKey
: Regenerate a key while maintaining its metadataupdateKeyDescription
: Update a key's description
Best Practices for Custom Interfaces
-
Error Handling:
- Add proper error handling for API operations
- Show loading states during async operations
- Provide clear feedback for successful/failed operations
-
User Experience:
- Add confirmation dialogs for destructive actions
- Show success/error notifications
- Implement proper form validation
-
Security:
- Don't store API keys in local storage
- Implement proper access controls
- Consider adding copy-to-clipboard functionality
-
Styling:
- Match your documentation's design system
- Ensure responsive design
- Add proper loading and error states
By creating a custom interface, you have complete control over the API key management experience while leveraging Zudoku's built-in functionality through the useZudoku
hook.