Authorizations
Unkey uses API keys (root keys) for authentication. These keys authorize access to management operations in the API. To authenticate, include your root key in the Authorization header of each request:
Authorization: Bearer unkey_123
Root keys have specific permissions attached to them, controlling what operations they can perform. Key permissions follow a hierarchical structure with patterns like resource.resource_id.action
(e.g., apis.*.create_key
, apis.*.read_api
).
Security best practices:
- Keep root keys secure and never expose them in client-side code
- Use different root keys for different environments
- Rotate keys periodically, especially after team member departures
- Create keys with minimal necessary permissions following least privilege principle
- Monitor key usage with audit logs.
Body
Unique identifier of the role to permanently delete from your workspace. Must either be a valid role ID that begins with 'role_' or the given role name and exists within your workspace.
WARNING: Deletion is immediate and irreversible with significant consequences:
- All API keys assigned this role will lose the associated permissions
- Access to resources protected by this role's permissions will be denied
- Any authorization logic depending on this role will start failing
- Historical analytics referencing this role remain intact
Before deletion, ensure:
- You've updated any dependent authorization logic or code
- You've migrated any keys to use alternative roles or direct permissions
- You've notified relevant team members of the access changes
3 - 255
"role_dns_manager"
Response
Role deleted successfully
Metadata object included in every API response. This provides context about the request and is essential for debugging, audit trails, and support inquiries. The requestId
is particularly important when troubleshooting issues with the Unkey support team.
Empty response object by design. A successful response indicates this operation was successfully executed.