Skip to content

Scopes

Every access key carries a set of scopes that limit what the key can do. Grant only what is needed.

Browser sessions (cookie-based login) always have full access and are not subject to scope restrictions.

ScopeDescription
categories:readList and view key categories
categories:writeCreate, update, and delete categories
entries:readList and view entries (without values)
entries:writeCreate, update, and delete entries
entries:revealDecrypt and reveal entry values
2fa:readList and view 2FA tokens (without codes)
2fa:writeCreate, update, and delete 2FA tokens
2fa:revealReveal 2FA recovery codes
envs:readList and view env projects and files
envs:writeCreate, update, and delete env projects/files
envs:revealDecrypt and reveal env file content
stats:readRead dashboard statistics
export:readExport all entries as a .env file
ai:extractUse AI extraction to generate .env snippets
EndpointMethodRequired scope
/api/categoriesGETcategories:read
/api/categoriesPOSTcategories:write
/api/categories/{id}GETcategories:read
/api/categories/{id}PUTcategories:write
/api/categories/{id}DELETEcategories:write
/api/entriesGETentries:read
/api/entriesPOSTentries:write
/api/entries/{id}GETentries:read
/api/entries/{id}PUTentries:write
/api/entries/{id}DELETEentries:write
/api/entries/{id}/revealPOSTentries:reveal
/api/entries/project-namesGETentries:read
/api/2faGET2fa:read
/api/2faPOST2fa:write
/api/2fa/{id}PUT2fa:write
/api/2fa/{id}DELETE2fa:write
/api/2fa/{id}/revealPOST2fa:reveal
/api/envsGETenvs:read
/api/envsPOSTenvs:write
/api/envs/{id}GETenvs:read
/api/envs/{id}PUTenvs:write
/api/envs/{id}DELETEenvs:write
/api/envs/{id}/filesGETenvs:read
/api/envs/{id}/filesPOSTenvs:write
/api/envs/{id}/files/{fileId}DELETEenvs:write
/api/envs/{id}/files/{fileId}/revealPOSTenvs:reveal
/api/statsGETstats:read
/api/exportGETexport:read
/api/ai/extractPOSTai:extract
/api/access-keysGET, POST(session auth only)
/api/access-keys/{id}DELETE(session auth only)
/api/account/dataDELETE(session auth only)
/api/openapiGET(public, no auth)

Read-only automation (e.g., deployment scripts that only read secrets)

Section titled “Read-only automation (e.g., deployment scripts that only read secrets)”
["entries:read", "entries:reveal"]

CI/CD pipeline that also generates .env files

Section titled “CI/CD pipeline that also generates .env files”
["categories:read", "entries:read", "entries:reveal", "ai:extract"]
["envs:read", "envs:write", "envs:reveal"]

Full API access (admin-equivalent, no key management)

Section titled “Full API access (admin-equivalent, no key management)”
[
"categories:read",
"categories:write",
"entries:read",
"entries:write",
"entries:reveal",
"2fa:read",
"2fa:write",
"2fa:reveal",
"envs:read",
"envs:write",
"envs:reveal",
"stats:read",
"export:read",
"ai:extract"
]

When a key lacks the required scope, the API returns:

HTTP/1.1 403 Forbidden
Content-Type: application/json
{
"error": "Forbidden"
}

A missing or invalid key returns:

HTTP/1.1 401 Unauthorized
Content-Type: application/json
{
"error": "Unauthorized"
}