Creating API Keys via the Dashboard
API keys are created and managed through the Suiri dashboard.To create an API key
- Log in to the Suiri dashboard using your email address and one-time password (OTP).
- In the left navigation, select API keys.
- Click Create an API Key.
- Enter a name for the key to help identify its purpose.
- Click Create.
- Copy the generated API key and store it securely.
Note: API keys are displayed only once and cannot be retrieved after the dialog is closed.
Managing API Keys
From the API keys page, you can:- View existing API keys
- Revoke keys that are no longer needed
- Separation of environments (development, staging, production)
- Per-application and per-user usage tracking
- Internal chargeback and cost attribution
- Faster isolation of operational and performance issues
Best Practice: Use Separate API Keys per Application and User
Suiri strongly recommends creating separate API keys for each application and, where appropriate, each user or service. Using multiple API keys enables:- Clear chargeback and cost attribution by application, team, or customer
- Faster troubleshooting by isolating errors and latency issues to a specific key
- Safer key rotation without impacting unrelated services
- Improved security posture by limiting blast radius if a key is compromised
- One API key per environment (development, staging, production)
- One API key per microservice or application
- One API key per external customer or tenant in multi-tenant systems
Key Rotation & Revocation
For security and operational hygiene, Suiri supports key rotation:- API keys can be revoked at any time from the dashboard
- Revoked keys immediately lose access to the API
- New keys can be generated without impacting other active keys
Billing as a Security Control
Inference requests on Suiri require an active billing method, including in demo environments. This helps:- Prevent abuse and unauthorized large-scale usage
- Ensure predictable capacity planning and fair resource allocation
Secure Transport
- All API traffic is encrypted in transit using TLS
- Requests over insecure connections are rejected
What Suiri Does Not Do
- No long-lived sessions
- No server-side prompt or response storage
- No implicit trust based on IP address or client identity