Overview
The API Keys section in VergeCloud provides a centralized location to create, manage, and secure programmatic access to your organization’s services. API keys allow applications, scripts, or internal tools to interact with VergeCloud programmatically, without the need for manual intervention through the dashboard. By controlling these keys carefully, organizations can automate tasks, integrate third-party tools, and streamline workflows while maintaining a high level of security.
Through this section, you can generate new keys, assign specific roles and access scopes, monitor usage, and revoke keys if needed. Properly managing API keys ensures that only authorized applications or personnel can perform certain actions. This capability is critical for operational efficiency, security compliance, and adherence to the principle of least privilege, where users or systems are granted only the permissions they need to perform their functions.
API Keys List
The API Keys List provides a comprehensive overview of all API keys generated within your organization. Each entry in the list contains several pieces of information. The Name or Description column shows the custom label given during key creation, often including additional context about its purpose, such as automation scripts, CI/CD pipelines, or partner integrations. The API Key column displays a partially masked version of the key for recognition purposes without exposing the full token.
Roles indicate the permissions associated with the key, showing what actions the key is authorized to perform. The Created At column records the timestamp when the key was generated, helping administrators track its lifecycle. Finally, the Actions column provides options to view details, copy information, or revoke the key if it is no longer needed. This table makes it easy to manage multiple keys and ensures that access can be reviewed and adjusted regularly.

Create API Key Wizard
The Create API Key Wizard guides you through the process of generating a new key while ensuring that security best practices are followed.
In the first step, you provide the foundational details for the new key. The API Key Name is required and should be a unique label that makes the key easily identifiable. Optionally, you can provide a description that explains the purpose of the key, such as integration with a deployment pipeline or a specific automation script. Providing clear descriptions helps maintain clarity when multiple keys exist.
Step 2: Access Scope
Next, define the access scope of the key. You can grant access to all services, which allows the key to interact with every existing and future service within the organization, or restrict it to specific services only. Limiting scope is important to reduce security risks and ensure that keys cannot perform unintended actions. This step allows administrators to enforce the principle of least privilege, granting only the access required for the key’s intended purpose.
Step 3: Assign Roles
Choose one or more predefined roles that determine the key’s permissions:
- Admin – Full administrative control over the selected services.
- Read-Only Admin – Viewing access without permission to modify resources.
- Billing Manager – Create and manage billing-related functions.
- Cache Purger – Purge cached content across the CDN.
- DNS Manager – Create, modify, or delete DNS records.
- Security Manager – Manage security configurations such as WAF, DDoS protection, and other security policies.
- Traffic Manager – Configure routing rules and load balancing.
- Insights Analyst – Access traffic analytics, performance metrics, and reporting.
Step 4: View API Key
In the final step, the wizard displays the full API key value. This is the only time the key will be visible, so it is crucial to copy it and store it securely. Losing the key may require generating a new one, which could disrupt automation or integrations relying on it.
The full token used to authenticate API requests. Treat it like a password.
X-API-Key Header
Include this header in every request made to VergeCloud APIs:
X-API-Key: <your-api-key>
Important Considerations
- One-time visibility
The API key value is displayed only during creation and cannot be retrieved later.
- Non-editable
API keys cannot be modified after creation.
To change roles or scope, revoke the existing key and generate a new one.
- Least Privilege Principle
Assign only the required roles to reduce security risks.
- Scope Alignment
Ensure the scope accurately matches the role assignments to prevent unintended access.
- Immediate Revocation
Revoking or deleting an API key instantly blocks all associated API access.