Authentication
StableBearer tokens, scopes, permissions, and key rules for working with API keys.
Updated: March 5, 2026
The public Control Plane API uses Bearer authentication.
Header
Authorization: Bearer <token>
An API key is required for:
- Console;
- CLI;
- REST automation;
- profile and usage checks.
Scope and permissions
A key has a scope:
globalaccounttenant
And a set of permissions, among which the following are usually the most important:
can_create_tenantcan_create_dbcan_scalecan_delete
The practical rule is simple:
- scope determines what you can see;
- permissions determine what you can do.
What is important not to confuse
- an API key is access to the Control Plane;
pg_user/pg_passwordare access to PostgreSQL through Gateway.
These secrets are not interchangeable.
Console and email login
For Console, the token is additionally linked to the email from the account profile. That means a token may be formally valid, but Console may still fail to complete login if the account does not have an email set.
Security recommendations
- use separate keys for people and for CI;
- grant the minimum permissions required;
- rotate tokens when employees change or when compromise is suspected;
- do not store the API key next to the PostgreSQL DSN in open configurations.
