Authentication

API key model and access patterns.

XROH supports API key–based developer access. Keys are typically scoped to a wallet identity.

Key lifecycle

  • Create an API key.

  • List keys for a wallet.

  • Revoke a key.

  • Track usage per endpoint.

Notes

  • Keys should be treated as secrets.

  • Rate limits should apply per key.

  • Usage logs should include endpoint, status, and latency.

Last updated