Manage API credentials for server-to-server Yativo Crypto integrations
API keys are the recommended authentication method for Yativo Crypto integrations. They let your server authenticate programmatically without user sessions, and can be scoped to the minimum permissions your integration requires.
2FA must be enabled on your account before you can create API keys. All key management operations require a current TOTP code in the X-2FA-Token header.
Use the returned access_token as Authorization: Bearer {token} on all subsequent requests. Refresh it before expiry using the same endpoint.Method 2: Header-based (for simpler integrations)
Create dedicated API keys for sandbox and production. Never use a production key for testing.
Scope permissions minimally
A key used only for reading balances and transaction history should only have read. Only grant transactions to services that actually initiate transfers.
Rotate keys on a schedule
Rotate API secrets periodically (e.g., every 90 days) and immediately if you suspect a key has been exposed. The rotate endpoint generates a new secret without requiring you to delete and recreate the key.
Store secrets in environment variables
Never hardcode API keys in source code. Use environment variables or a secrets manager and inject at runtime.