Unkey Deploy is currently in private beta. To get access, reach out on
Discord or email
support@unkey.com.
Configure API key authentication
To enable API key authentication for your deployment:- Navigate to your project’s Sentinel Policies page from the sidebar.
- Click Add policy.
- Select Key Auth as the policy type.
- Choose one or more keyspaces to verify against.
- Optionally configure match conditions, a custom key location, or a permission query.
- Select which environments (production, preview, or both) to enable the policy for.
- Save the policy.
401 response and never reach your app.
How verification works
The Sentinel extracts the API key from theAuthorization header (as a Bearer token) and verifies it against your configured keyspaces. The following checks run in order:
- Existence. The key must belong to one of the configured keyspaces.
- Status. The key must not be disabled or revoked.
- Expiration. The key must not have passed its expiration timestamp.
- Credits. If remaining credits are configured, at least one credit must be available. Verification deducts one credit.
- Rate limits. All rate limit configurations attached to the key are evaluated. See rate limiting for details on response headers and behavior.
- Permissions. If a permission query is configured, the key must satisfy it.
X-Unkey-Principal header. See the API key source for the full list of fields your app receives, including roles, permissions, and key metadata.
Key location
By default, the Sentinel extracts the API key from theAuthorization header as a Bearer token. You can override this by adding a custom key location when creating or editing a policy:
| Location | Description | Example |
|---|---|---|
| Bearer | Extract from the Authorization: Bearer <key> header (default) | Authorization: Bearer sk_123 |
| Header | Extract from a custom header, with an optional prefix to strip | X-API-Key: sk_123 |
| Query param | Extract from a URL query parameter | ?api_key=sk_123 |
Permission query
You can enforce Unkey RBAC permissions directly in the Sentinel by setting a permission query on a policy. If the authenticated key lacks the required permissions, the request receives a403 response before reaching your app.
Permission queries support AND and OR operators:
api.read AND api.writerequires both permissionsapi.read OR api.writerequires either permission
Error responses
| Scenario | Status | Description |
|---|---|---|
| No credentials provided | 401 | The request is missing an API key |
| Invalid, disabled, or expired key | 401 | The API key failed verification |
| Insufficient permissions | 403 | The key lacks required permissions |
| Rate limit exceeded | 429 | The key’s rate limit was exceeded |

