StatusPage.me Help Center

Popular topics: creating a status page, connecting monitors, automatic incidents, custom domains, integrations and billing.

StatusPage.me Mar 5, 2026 Account & Billing

API Keys

API keys let you authenticate requests to the StatusPage.me API from your own scripts, CI pipelines, or integrations — without using your account password.

Plan requirement: API key creation requires a plan that includes API access. If the API Keys section is not visible on your Security page, upgrade your plan to enable it.


Creating an API Key

  1. Go to Security in your dashboard (/user/security).
  2. Scroll to the API Keys section.
  3. Enter a descriptive name for the key (up to 120 characters) so you can recognize it later.
  4. Click Create API Key.
  5. Copy the token immediately — it is shown only once and cannot be retrieved later. A copy button is shown alongside the token in the confirmation dialog.

Once you close the dialog, only the key’s name, prefix, and creation date are stored. The full token is never displayed again.


Using an API Key

Include your API key as a Bearer token in the Authorization header of your requests:

Authorization: Bearer spk_yourtokenhere

Managing API Keys

The API Keys table on the Security page shows:

ColumnDescription
NameThe label you gave the key
PrefixThe first few characters of the token (for identification)
CreatedWhen the key was created
Last usedWhen the key last made a successful request
StatusActive or Revoked

Revoking an API Key

To revoke a key:

  1. Find the key in the API Keys table.
  2. Click Revoke and confirm.

Revocation is immediate — any requests using that token will be rejected. Revoked keys remain listed so you have an audit record of previously active keys.


Security Best Practices

  • Name keys descriptively — e.g. “GitHub Actions deploy” or “Local dev script” so you know what’s using each key.
  • One key per integration — if a key is leaked, you can revoke only the affected key without disrupting other integrations.
  • Revoke unused keys — remove keys you’re no longer using to reduce your attack surface.
  • Never commit tokens to source control — use environment variables or a secrets manager.

Was this article helpful?

Share this article: