The taap.it API uses API key-based authentication to secure access to your account and resources. All API requests must include a valid API key in the Authorization header.Documentation Index
Fetch the complete documentation index at: https://docs.taap.it/llms.txt
Use this file to discover all available pages before exploring further.
API Key Overview
API keys provide secure access to your taap.it account and are created through the web application dashboard. Each API key is:- User-specific: Tied to your user account
- Scoped: Can have full access, read-only access, or limited permissions
- Secure: Prefixed with
taapit_and cryptographically generated
Creating API Keys
Set Permissions
Choose the appropriate permission level for your use case:
- Full Access: Complete read/write access to all resources
- Read Only: View-only access to all resources
- Limited Access: Custom permissions for specific resources
Using API Keys
Include your API key in the Authorization header using the Bearer token format:Example Requests
Permission Levels
API keys can have different permission levels that control access to resources:Full Access
Grants complete read and write access to all resources and endpoints.
- Use case: Server-to-server integrations, administrative tools
- Permissions: All read and write operations
- Security: High - monitor usage carefully
Read Only
Provides view-only access to all resources without modification capabilities.
- Use case: Analytics dashboards, reporting tools
- Permissions: GET operations only
- Security: Medium - data exposure limited to viewing
Limited Access
- Use case: Third-party integrations with specific needs
- Permissions: Configurable per resource (domains, links, projects, workspaces, analytics)
- Security: High - minimal necessary permissions
Security Best Practices
Key Storage
Key Storage
- Store API keys in environment variables, not in code
- Use secure key management services for production
- Never commit API keys to version control
- Rotate keys regularly for enhanced security
Access Control
Access Control
- Use the principle of least privilege
- Create separate keys for different environments
- Monitor API key usage and set up alerts
- Deactivate unused or compromised keys immediately
Network Security
Network Security
- Always use HTTPS for API requests
- Implement proper error handling
- Use IP whitelisting when possible
- Monitor for suspicious activity
Error Handling
Authentication Errors
Common Authentication Issues
Invalid API Key
Invalid API Key
- Verify the key is copied correctly
- Check that the key hasn’t been deactivated
- Ensure you’re using the full key including the
taapit_prefix
Permission Denied
Permission Denied
- Check if your API key has the required permissions
- Verify you’re trying to access resources you own
- Consider upgrading to a key with full access
Rate Limiting
Rate Limiting
- Monitor your request frequency
- Implement exponential backoff
- Check the rate limit headers in responses
Migration Guide
If you’re migrating from another authentication method or upgrading your integration:Ready to authenticate?
Follow our quickstart guide to make your first authenticated API call.