Get Started
Create your Yativo account at app.yativo.com. The dashboard uses passwordless authentication — enter your email, receive a 5-digit OTP, and you’re in. Google OAuth is also supported. After signing up, complete the Business KYC onboarding to unlock API access. This includes submitting your company details, uploading documents, and verifying UBOs (Ultimate Beneficial Owners). Once approved, retrieve your Account ID and generate your App Secret from the Developer section of the dashboard (Developer → API Key).Environments
| Environment | Base URL |
|---|---|
| Production | https://api.yativo.com/api/v1 |
| Sandbox | https://smtp.yativo.com/api/v1 |
Generate a Bearer Token
All API requests require a Bearer token. For server-to-server / programmatic API access, authenticate with your Account ID and App Secret:Your Account ID from the Yativo dashboard (Settings → Account).
Your App Secret generated from Developer → API Key. Treat this like a password.
Tokens expire in 600 seconds (10 minutes). Refresh before expiry to maintain uninterrupted API access.
Get Your API Keys
- Log in to app.yativo.com
- Go to Developer → API Key
- Click Generate Secret
- Enter your 4-digit transaction PIN when prompted
- Copy and securely store your App Secret — it is shown only once
Using the Bearer Token
Include the token in theAuthorization header for all subsequent requests:
Refresh Token
Refresh an expiring token without re-authenticating with your credentials:Idempotency
AllPOST, PUT, and PATCH requests require an Idempotency-Key header. This ensures safe retries without risk of duplicate operations.
Two-Factor Authentication (2FA)
2FA is optional but strongly recommended for your dashboard account. Enable it under Developer → Security → 2FA. To set up 2FA programmatically:- Generate a 2FA secret —
POST /generate-2fa-secret→ returns a secret to add to your authenticator app - Enable 2FA —
POST /enable-2fa→ activates 2FA on your account - Verify a 2FA code —
POST /verify-2fawith{ "otp": "6-digit" }→ returns your app secret after 2FA confirmation
Security Best Practices
- Store
account_idandapp_secretin environment variables or a secrets manager — never hardcode them or commit to source control. - Rotate your
app_secretimmediately if you suspect it has been compromised. - Use the sandbox environment (
https://smtp.yativo.com/api/v1) for all development and testing. - Enable 2FA on your dashboard account.
- Use short-lived tokens and refresh them proactively before expiry (before 600 seconds).

