Key generation scheme¶
An API key is composed of two items:
- A prefix
P, which is a generated string of 8 characters.
- A secret key
SK, which is a generated string of 32 characters.
The generated key that clients use to make authorized requests is
GK = P.SK. It is treated with the same level of care as passwords:
- Only a hashed version is stored in the database. The hash is computed using the default password hasher. 1
- The generated key is shown only once to the client upon API key creation.
Access is granted if and only if all of the following is true:
- The configured API key header is present and correctly formatted. 2
- A usable API key with the prefix of the given key exists in the database. 3
- The hash of the given key matches that of the API key.
API keys ≠ Security: depending on your situation, you should probably not use API keys only to authorize your clients.
Besides, it is NOT recommended to use this package for authentication, i.e. retrieving user information from API keys.
Indeed, using API keys shifts the responsability of Information Security on your clients. This induces risks, especially if detaining an API key gives access to confidential information or write operations. For example, an attacker could impersonate clients if they let their API keys leak.
As a best practice, you should apply the Principle of Least Privilege: allow only those who require resources to access those specific resources. In other words: if your client needs to access an endpoint, add API permissions on that endpoint only instead of the whole API.
Besides, it is highly recommended to serve the API over HTTPS to ensure the confidentiality of API keys passed in requests.