KubeadaptDocsBack to site
Sign inStart free
DocsAPI ReferenceCLI
  • Introduction
  • Getting Started
  • Capabilities
    • Connect a cluster
    • Right-size your workloads
    • Monitor GPU workloads
    • Trace cost to a team
    • Plan a safe spot migration
    • Clean up abandoned workloads
    • Invite teammates and set roles
    • Configure SAML SSO
    • Mint an API key
    • Rotate an API key
Docs homev1How To GuidesMint An Api Key

How-to Guides

Mint an API key

Create a Kubeadapt API key from the dashboard with the right scopes for one integration.


Every integration that calls the Kubeadapt REST API needs its own key. This guide walks the dashboard flow, the scope decision, and the one-time-secret handling rules.


1. Open the API Keys page

Go to app.kubeadapt.io → Settings → API Keys → + Create Key.

The dialog has two inputs: a Name and a Scopes picker. Every key issued today covers every cluster in your tenant — there is no per-cluster allow-list in the UI yet.


2. Name the key

Use the integration name, not a person's name: grafana-export, finance-chargeback, ci-cost-check. Descriptive names make later audits and revocations far easier.

The field accepts up to 255 characters and is required.


3. Pick the minimum scopes

The dashboard lists every *:read scope as a toggleable pill, grouped by category. Tick only what the integration actually calls — at least one scope is required to enable Create Key. Read-only access is enforced server-side.

Available scopes:

CategoryScopeUnlocks
Organizationorganization:readTenant metadata
Clustersclusters:readCluster inventory
Workloadsnamespaces:readNamespace listing
Workloadsworkloads:readDeployments, StatefulSets, DaemonSets, Jobs
Infrastructurenodes:readNode inventory and capacity
Recommendationsrecommendations:readRight-sizing and savings suggestions
Attributionteams:readTeam allocations
Attributiondepartments:readDepartment allocations
Attributioncost_explorer:readCost Explorer queries

Common minimum sets:

IntegrationScopes
Read-only Grafana / BI exporterorganization:read, clusters:read, namespaces:read, workloads:read, nodes:read
Finance chargeback pipelineteams:read, departments:read, organization:read
SRE savings dashboardrecommendations:read, clusters:read, nodes:read
Cost Explorer query proxycost_explorer:read

Adding scopes later means minting a second key — the dashboard does not edit existing keys.

See Permission Scopes for the full endpoint-to-scope mapping.


4. Cluster visibility

Every key issued from the dashboard sees every cluster in the tenant, including clusters added after the key was minted. A per-cluster allow-list picker is on the roadmap.

If you need to gate an integration to a subset of clusters today, filter by cluster_id in your downstream code, or contact support to scope a key manually.


5. Copy the key immediately

The full key is shown once. Copy it into a password manager or your secrets store before navigating away.

Warning

A leaked key is a full credential to read your tenant's data. Never commit it to source control, paste it into chat tools, ship it in mobile or browser binaries, or log it. The only response to a leak is to revoke the key — Kubeadapt stores only an irreversible hash and cannot recover the original.


6. Verify the key

Run a 200 OK smoke test before deploying the key to production:

bash
curl -H "Authorization: Bearer ka_live_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" \
  "https://public-api.kubeadapt.io/v1/organization"

A 401 UNAUTHORIZED means the header is wrong or the key was not accepted. A 403 FORBIDDEN means the key works but is missing the organization:read scope — mint a new key with the right scopes (existing keys cannot be edited).

See Authentication for the full 401 vs 403 contract.


See also

  • Rotate an API key — zero-downtime cutover from old to new.
  • Authentication — the wire-level contract.
  • Permission Scopes — the full scope catalog.

Related

  • Authentication
  • Permission Scopes
  • Rotate an API key
PreviousConfigure SAML SSOHow-to GuidesNextRotate an API keyHow-to Guides

On this page

  • 1. Open the API Keys page
  • 2. Name the key
  • 3. Pick the minimum scopes
  • 4. Cluster visibility
  • 5. Copy the key immediately
  • 6. Verify the key
  • See also
Edit this page
Kubeadapt

Kubernetes FinOps platform. Cost visibility, rightsizing, and capacity planning that pays for itself in 30 days.

Product

  • Cost Monitoring
  • Cost Attribution
  • Workload Rightsizing
  • Recommendations
  • Smart Alerting
  • Best Practices
  • Network Cross-AZ

Resources

  • Documentation
  • Status Page
  • Feature Requests

Company

  • About Us
  • Security
  • Careers
  • Contact

© 2026 Kubeadapt. All rights reserved.

PrivacyTermsSecurity