Application programming interfaces (APIs)allow software programs to interact with each other, share data, and integrate their functionalities. APIs facilitate conversations between otherwise disconnected software, and are the technology behind many powerful integrations that you use every day.

Unlike a face-to-face conversation, however, it’s harder for an API to verify whether the app it's talking to is who it claims to be. Since they often expose private and sensitive information, APIs need ways of identifying their clients before letting them through. Otherwise, it’s a big security gamble.

API keys are one such security measure — they act like an ID card for the client making an API request, helping APIs to assign the right access permissions, as well as track how their data are being used.

If you work with APIs ormarketing integrations, you should know what API keys are, where they fit intoAPI security, and why they’re not the only layer of protection you should be thinking about. Let us explain.

Download Now: Free Intro Guide to HTML & CSS

In general, API keys serve two main functions in an API request:

  • Project authentication:The API key identifies the application making the request to the API receiving the request. Each project has a unique key to distinguish it from other projects.
  • Project authorization:The API key tells the API whether the requesting application has permission to use the API and which of the API’s services it may access. Even if an application can access an API, it might only be authorized to use a limited set of the API’s services.

Based on the API key provided in a request, the API checks the key with its client database, then either accepts or denies the request. If the request is accepted, the API grants the client access to its data and functionality based on the client’s access rights, which are also associated with the API key.

Additionally, API owners use API keys to monitor API activity, including the types of requests and volume of requests coming from individual clients. Since each request has an associated key, the API owners can filter by key and view all requests from a particular client.

This monitoring ability is especially important when protecting the API from harmful traffic. Hackers frequently target APIs through a variety of methods, such as faking credentials to inject harmful code or overwhelming the API server with requests. With keys, an API can eliminate anonymous bot traffic or block requests from a particular user if needed.

It’s important to note that API keys identify requests from projects and applications,notfrom individual users. An API key tells the API which project the request came from, but it cannot identify specific users with access to the project. This is a significant security limitation that we’ll discuss later on.

How to Use an API Key

APIs usually require developers to acquire a key before making requests. The process should be documented on the API developer’s website and tell you everything you need to get started.

In most cases, you’ll need to sign up for a developer account with an email and other information. Then, you’ll be asked to register your project and enter any project information the API owners should know about.

From there, you should receive at least one API key, a unique string of randomly generated characters associated with your project. It will look something like this:


JPkxhc9cGFv35OWu267fsx8R6uZj29GL

You may receive two keys, one labeled as your “public key” and the other as your “private key.” A public key can be shared with collaborators and is more limited in access to the API’s data and functions. A private key should not be shared with anyone — it’s the more definitive identifier of your project and gives access to your developer account, plus all of your data.

As for including your API key in requests, refer to the API’s documentation for where to place your key — typically, it’s in the request header:


GET /https://api.example.com/resource/
auth: JPkxhc9cGFv35OWu267fsx8R6uZj29GL

……或者reque后编写的查询字符串st method:


GET 'https://api.example.com/resource/?auth=JPkxhc9cGFv35OWu267fsx8R6uZj29GL'

Are API keys secure?

Web APIs are a common target of cyberattacks because they transfer sensitive data between applications — including login credentials, personal information, and financial transactions — over the internet. To combat this, web APIs need to be very secure at all times.

API keys can identify a project to an API and specify which resources a project may access. However, experts do not consider API keys to be secure enough on their own. This is for a few reasons:

  • API keys can’t authenticate the individual user making the request, only the project or application sending the request.
  • API keys are like passwords — they’re only effective if the owner stores them securely. If a key falls into the wrong hands, it can easily be exploited
  • Since API keys rarely expire, a hacker can use the key indefinitely, unless the key’s owner regenerates or deactivates the key.

For these reasons, popular APIs today also employ user authentication and authorization. User authentication checks that the individual making the request (not just the application) is who they say they are. User authorization verifies that this person is allowed to make the request they made.

User authentication and authorization are accomplished with authentication tokens, which are more secure than API keys by themselves. The OAuth protocol is today’s standard for user authentication and authorization, allowing users to verify their identity without providing a password. This is the same technology behind single sign-on, in which users can log into one application (like LinkedIn) through another application (like Google).

OAuth is a more complex process that deserves its own article, sohere’s an explainer that goes in-depth on how OAuth works.

How to Store API Keys Securely

尽管他们的缺点,仍popula API键r and useful at identifying calling projects. There’s a good chance you’ll need to keep track of one or several when working with an API.

API keys work a lot like passwords and should be stored and protected as such. Here are some basic steps you can take to limit the risk of your key being stolen:

  • Don’t write down your key in a public place, like on a sticky note or in a file on a public computer. You can safely access your key inside your developer account.
  • Be careful not to accidentally expose your key when documenting your project, such as with screenshots, uploading to a public repository, or in a URL.
  • Don’t write your API key directly into your program, as anyone with access to your source files can see your key.
  • Before sharing your API key, regenerate it and label it as the newest shared key.
  • Don’t share API keys through email.
  • Always useHTTPS/SSLfor your API requests — some APIs won’t field your request if you’re not using it.
  • Assign a unique API key to each of your projects and label them accordingly. If you find out one key has been compromised, you can regenerate it or deactivate it without affecting your other projects.

API Key Examples

To drive this lesson home, here are some examples of popular APIs and how they implement API keys for security.

Google Maps API Key

The Google Maps Platform uses API keys to secure its requests for map data. After setting up a developer account with Google, you can easilycreate a Google Maps API keyin your credentials area.

Google also encourages users to restrict their API keys to accepted domains and allows you to do this in the credentials area. Additionally, the Google Maps API only accepts requests secured with HTTPS.

Google provides the following example of what an API key looks like in a request:



Want to put interactive Google maps on your site or app? Check out ourguide to getting started with Google Maps APIs

Stripe API Key

To authenticate requests to its API, payment processing serviceStripe provides API keys for each developer account. Specifically, it issues two types of API keys: “publishable,” which is your public key that associates your account with Stripe, and “secret,” your confidential private key that lets you make any request to Stripe.

条纹问题发表和秘密的两双keys, one for your live application and one forAPI testing. This gives your four keys total. Test API keys include the substring_test_.

free api keys: stripe example

Image Source

Stripe also lets users generate keys with greater restrictions if you’re implementing the API in amicroservice.

Help secure your requests with API keys.

Though API keys are not the only (or even the best) API security measure, they’re still useful for API vendors and important for authenticating API integrations.

As API integrations develop and spread among new applications and smart devices, one thing won’t change: There will always be people looking to steal and exploit personal data. That’s why any reputable API that transmits sensitive information will include API keys (and more) in its security arsenal.

New Call-to-action

css introduction

Originally published Sep 22, 2021 7:00:00 AM, updated September 22 2021

Topics:

Application Programming Interface (API)