Securing your requests to the VKRA API
VKRA uses industry-standard authentication patterns to ensure that your requests are secure and that your usage is properly tracked.
Most requests to the VKRA API are authenticated using an API key. This key should be included in the x-api-key header of every request.
| Header | Value |
|---|---|
x-api-key | YOUR_API_KEY |
You can manage your API keys in the VKRA Dashboard.
For internal dashboard operations or when using our administrative endpoints, we use Bearer tokens (JWT). These are typically handled automatically by our official dashboard frontend.
| Header | Value |
|---|---|
Authorization | Bearer <token> |
To keep your VKRA account and data secure, follow these best practices:
development and another for production).API rate limits are applied per API key. We include rate limit information in the response headers of every request.
| Header | Description |
|---|---|
X-RateLimit-Limit | Total number of requests allowed in the current window. |
X-RateLimit-Remaining | Number of requests remaining in the current window. |
X-RateLimit-Reset | Unix timestamp when the current window resets. |
If you exceed the rate limit, the API will return a 429 Too Many Requests error.