Enable Secure Mode, manage server & API keys, add mTLS, and compare authentication approaches.
Navigate
Toggle Secure Mode
Generate Server Key
Store Secret
Implement Backend
Mode | Client Secret Exposure | Abuse Risk | Operational Overhead | Recommended Use |
---|---|---|---|---|
Unsecure | API Key only | High (impersonation) | Low | Prototyping only |
Secure | None (short auth token) | Low | Medium (backend endpoint) | Standard production |
Secure + mTLS | None | Lowest | Medium (cert lifecycle) | High compliance / sensitive workloads |
API Key
Server Key
Auth Token
Access Token
Prerequisite
CSR Creation
Upload CSR
Issue & Activate
Deploy Cert
Server Key Rotation
mTLS Renewal
Logging Discipline
Incident Response
Metric | Target | Trigger |
---|---|---|
Unauthorized Attempts | 0 | Any → investigate & rotate |
Server Key Age (days) | < 365 | ≥ 365 → rotate |
mTLS Coverage (%) | 100% for auth endpoints | <100% → migrate remaining calls |
Auth Token Failure % | < 2% | Spike → check clocks / code path |
Cert Expiry Lead (days) | > 30 | < 30 → start renewal |
Symptom | Cause | Resolution |
---|---|---|
401 on auth token request | Wrong/rotated Server Key | Update secret & redeploy backend |
Access token missing | Auth token not supplied | Ensure client sends authToken parameter |
mTLS handshake fail | Expired or CN mismatch | Renew cert; confirm chain validity |
High auth failure rate | Clock skew | Sync NTP on servers |
Sudden unauthorized spike | Key compromise | Rotate Server Key immediately; audit logs |