Skip to main content

Profiles

A profile is the runtime access contract for a client: auth type, method/IP constraints, and active state.

Profile guides

Creating a profile

  1. Open a client and click Add Profile.

  2. Fill in:

    FieldDescription
    NameDescriptive label (e.g. production, sandbox, read-only)
    ActiveToggle to enable or disable the profile
    Auth TypeThe authentication method for this profile
    Allowed MethodsOptional — restrict to specific HTTP methods
    IP RestrictionsOptional — restrict by IP address or CIDR
  3. Complete the auth-type specific fields (token is auto-generated; JWT/OIDC/mTLS require additional config).

  4. Click Save. The profile credentials are displayed once — copy them immediately.


What profiles control (runtime)

SettingDescription
Auth typeHow the client authenticates (token, JWT, OIDC, mTLS, none)
CredentialAuth material (token/JWT/OIDC settings, or external mTLS posture)
Allowed methodsOptional: restrict to specific HTTP methods (e.g., GET only)
Allowed IPsOptional: restrict to specific IP addresses or CIDR ranges
StatusActive or inactive

IP address restrictions

Set a list of allowed IPs or CIDR ranges. Requests from any other IP are rejected with 403.

  • CIDR notation: 192.168.1.0/24
  • Exact IP: 10.0.0.5
  • Multiple entries: one per line
  • Empty list: no IP restriction (all IPs allowed)

IP checks run before authentication — an IP-blocked request is rejected before the token is even verified.


Method restrictions

Set the list of allowed HTTP methods. Requests using any other method return 405 Method Not Allowed.

Examples:

  • GET only — read-only consumers
  • GET, POST — consumers that can read and create
  • Empty / all — no restriction

Token expiry state

The profile detail page shows the current state of the issued token:

BadgeMeaningAction
Valid (green)Token is active and will not expire soonNone needed
Expiring Soon (amber)Token expires within 24 hoursRotate before expiry
Expired (red)Token has expired; all requests are rejected with 401Rotate immediately

Credential management in the UI

From the profile detail page, you can:

ActionDescription
Show / Hide credentialsToggle visibility of the token or secret
Copy credentialsCopy the raw token/secret to clipboard
Copy X-Client-IDCopy the client's ID header value
Copy X-Profile-IDCopy the profile's ID header value
Copy Authorization headerCopy the full Authorization: Bearer <token> string
Rotate credentialsGenerate a new token; the old one is immediately invalidated
Change auth typeSwitch to a different auth method (re-configures credential fields)
Remove authSwitch to none — removes all auth from the profile

Configuring rotation expiry: when rotating, you can set an expiry period in hours. After that period, the new token becomes invalid and must be rotated again.


Multiple profiles per client

A single client can have multiple profiles for different use cases:

ProfileAuth typeUse case
sandboxTokenDevelopment and testing, liberal limits
productionmTLSLive traffic, strict security
readonlyOIDCAuthenticated but read-only access (GET only)
internalNoneInternal services on trusted network

Each profile is identified independently by its X-Profile-ID.


Disabling a profile

Toggle a profile to inactive to stop all requests using that profile without deleting it. Useful for temporarily revoking access.