Managing API Keys
Article Type: Configuration / How-To
Audience: Enterprise Administrators
Module: Access Control
Applies to Versions: All Versions
Estimated Time: 15-20 minutes
1. Overview
API Keys provide secure, programmatic access to the Fuuz platform for external system integrations. Enterprise Administrators use API Keys to enable external systems, middleware platforms, and custom applications to authenticate and interact with Fuuz GraphQL APIs, Data Flows, webhooks, and other platform resources. Each API Key is scoped to a single tenant and assigned to an API Access user with specific RBAC permissions.
Before You Begin: Create an API Access user via Enterprise Users interface. The user must have access to the target tenant. See Managing Enterprise Users article for detailed instructions on creating API Access type users.
Interface Naming Note: The current interface labels this feature as "User API Keys." This will be updated to "API Keys" in 2026.
Common Use Cases
- ERP Integration: External ERP systems pushing data to Fuuz via user interactions or automated processes
- Middleware & iPaaS: Integration platforms querying Fuuz data for synchronization or workflow automation
- Edge Systems: Industrial systems like Ignition pulling enterprise configuration or master data from Fuuz
- Custom Applications: Custom-built UIs, mobile apps, or frontline worker tools accessing Fuuz data and services
Key Concepts
- Tenant Scope: Each API Key is scoped to a single tenant. Multi-tenant integrations require multiple keys.
- API Access Users: API Keys are assigned to API Access type users that follow standard RBAC with Policy Groups.
- One-Time Visibility: API Keys are displayed only once at creation. If lost, a new key must be generated.
- Enterprise Admin Only: Only Enterprise Administrators can create, manage, and inactivate API Keys.
2. Prerequisites
- Access Level: Enterprise Administrator with Enterprise Admin Home access
- Permissions: Access Control management permissions
- Resources: API Access user with access to target tenant must exist
3. Procedure Steps
Step 1: Navigate to API Keys
Access the API Keys management interface to view existing keys and create new ones.
- Navigate to
Enterprise Admin → Access Control → API Keys - The API Keys table displays existing keys with columns: Id, Name, Active, User, Tenant, Last Authenticated At
- Review existing keys and their authentication status

Step 2: Create New API Key
Generate a new API Key and assign it to an API Access user.
- Click the + (Add) button in the toolbar
- The Create a new User Api Key dialog opens
Complete the required fields:
- Name (required): Unique identifier; use descriptive naming (e.g., "ERP-Production-Integration")
- Tenant (required): Select application; filters available users to those with tenant access
- User (required): Select API Access user from filtered list
- Click + (Submit) to generate the key

Step 3: Secure the Generated Key
Copy and store the API Key immediately as it will never be displayed again.
- The API Key dialog displays with the generated key
- CRITICAL: Copy the API Key immediately
- Click the copy button or manually select and copy the entire key string
- Store the key in your organization's secure credential management system
- Close the dialog only after confirming the key is securely stored
Security Warning: The key is displayed only once at creation. If you lose the key, you cannot retrieve it and must generate a new key. Store keys securely using your organization's credential management practices.
Assign Policy Groups to control what the API Key can access.
- Navigate to the tenant specified when creating the key
- Go to Access Control → App Users
- Locate the API Access user associated with the key
Assign appropriate Policy Groups (not Roles):
- Grant access to specific API resources and Data Flows
- Avoid assigning screen access
- Use separate API-specific Policy Groups
Configure security policies:
- IP restrictions if integration comes from known addresses
- Data model field-level permissions for sensitive data
- Read-only operations if integration only queries data
Step 5: Multi-Tenant Integration Setup (If Needed)
For external systems requiring access to multiple applications, create separate keys for each tenant.
- Create separate API Access users for each tenant
- Generate separate API Keys for each tenant
- Configure RBAC independently within each application context
- External system manages multiple keys and routes requests appropriately
4. Configuration Reference
API Key Fields
| Field |
Description |
Notes |
| Id |
System-generated unique identifier |
Read-only; used internally |
| Name |
Human-readable identifier |
Must be unique |
| Active |
Current status of the key |
Unchecked = immediate auth failure |
| User |
API Access user the key authenticates as |
User's RBAC controls access |
| Tenant |
Application the key provides access to |
Cannot change after creation |
| Last Authenticated At |
Timestamp of most recent use |
Updates every time key is used |
API Capabilities
| Resource Type |
Access Provided |
| GraphQL APIs |
Query and mutate Fuuz data models |
| Data Flows |
Trigger and monitor integration workflows |
| Webhooks |
Receive event notifications from Fuuz |
| REST Endpoints |
Access specialized platform services |
Licensing Model
- Licensing Level: API Integration capability at the integration level
- Multiple Integration Points: Single API Key may support multiple integration points
- Rate Limits: No technical rate limits on API Keys
- Soft Limits: Exceeding licensed integration points triggers billing update; service not interrupted
- Key Quantity: No system limit on number of keys per user or tenant
5. Validation & Testing
Success Criteria:
- ✓ API Key created and securely stored in credential management system
- ✓ API Access user has appropriate Policy Groups assigned
- ✓ External system successfully authenticates using the key
- ✓ Integration can access required Fuuz resources (GraphQL, Data Flows, etc.)
- ✓ Last Authenticated At timestamp updates when key is used
- ✓ Authentication Events report shows successful authentications
Testing Procedure
- Configure external system with the new API Key
- Attempt authentication from the external system
- Verify successful authentication in
Enterprise Admin → Access Control → Authentication Events - Test access to specific resources (e.g., query a data model, trigger a Data Flow)
- Verify proper authorization based on assigned Policy Groups
- Check that Last Authenticated At timestamp updated in API Keys table
Key Management Operations
Inactivating API Keys:
- Navigate to
Enterprise Admin → Access Control → API Keys - Select the API Key to inactivate
- Uncheck the Active checkbox
- Verify integrations using the key immediately fail authentication
Reactivating API Keys:
- Filter the API Keys table to show inactive keys
- Select the inactive key to reactivate
- Verify associated user, tenant, and user access are still active
- Check the Active checkbox
- Verify integrations can authenticate again immediately
Note: The Delete button in the API Keys toolbar is always disabled. API Keys cannot be deleted, only inactivated. This maintains audit history.
Best Practices
- Naming Convention: Use pattern [System]-[Environment]-[Purpose] (e.g., "SAP-Production-OrderSync")
- Key Rotation: Establish key rotation schedule; currently requires creating new key and inactivating old
- Monitoring: Review Last Authenticated At column monthly to identify unused keys
- Security: Use IP restrictions for integrations from known static addresses
- RBAC: Create separate API-specific Policy Groups; avoid reusing web user policies
- Documentation: Maintain external documentation mapping keys to integration systems
6. Troubleshooting
| Problem |
Cause |
Solution |
| Cannot create API Key - no users in dropdown |
No API Access users have access to selected tenant |
Create API Access user via Enterprise Users; grant access to target tenant |
| Integration authentication failing |
API Key inactivated or user disabled |
Check key Active status and user status; reactivate if needed |
| Lost API Key after creation |
Key not copied before closing dialog |
Cannot retrieve; inactivate old key and generate new one |
| API calls return authorization errors |
User lacks required RBAC permissions |
Navigate to tenant's App Users; assign Policy Groups |
| Cannot reactivate API Key |
User, tenant, or access no longer exists |
Verify user status and access; restore or create new key |
| Multiple integrations stopped working |
API Access user inactivated |
Reactivate user in Enterprise Users interface |
| IP restriction blocking requests |
External system IP changed |
Update IP restrictions in user's Access Control Policy |
| Last Authenticated At not updating |
Integration not authenticating successfully |
Check Authentication Events report for failed attempts |
Using Authentication Events Report
To investigate API Key authentication issues:
- Navigate to
Enterprise Admin → Access Control → Authentication Events - Filter by the API Access user associated with the key
- Review failed authentication attempts for error codes
- Common failures: Invalid credentials, IP restriction violation, User inactive, Tenant access revoked
- Managing Enterprise Users: Creating and configuring API Access type users
- Access Control Overview: Fuuz access control model including Policy Groups
- Managing App Users: Configuring RBAC at application level
- Authentication Events: Security monitoring and troubleshooting
- GraphQL API Documentation: Technical reference for Fuuz GraphQL APIs
- Data Flow Integration Guide: Triggering and monitoring Data Flows via API
8. Revision History
| Version |
Date |
Editor |
Description |
| 1.0 |
2025-12-29 |
Craig Scott |
Initial Release |