API keys can be used to authenticate the users behind the applications making API calls to AdaptiveWork. Access keys simplify the management of these users and their applications, which include custom integrations and cloud-based services, such as SCIM-based user provisioning.
Using API keys instead of username and password credentials provides the following advantages:
Improved user authentication and management, so less maintenance and effort for admins:
More visibility and control for admins with dedicated system settings.
API keys have later expiration dates (1 year).
Secondary key for easy refreshing and continuous service.
Enhanced security - User credentials are not saved locally
To begin generating API keys, an administrator must designate a user as an integration user.
NOTE
We recommend that you create a unique integration user for each third-party integration. Integration users should not be administrators but should have at least Lite Admin permissions.
Once you have an integration user, that user can begin generating API keys.

TIP
You can create a key rotation cycle by staggering the creation of primary and secondary keys. By generating an initial primary key and then creating a secondary key at a later time, the secondary key will still be valid and immediately usable when the primary key expires. You can then regenerate the primary key.
This key rotation strategy is considered a best practice to minimize potential downtime and ensure continuity in case a key becomes compromised.
NOTE
Once the window is closed, you cannot copy the keys you generated.
Once the keys are generated, you can click Manage API Keys to view when a key is going to expire or when a key expired.
There are mulitple methods to revoke API Keys. The methods you can use will depend on your user role.
This revokes that user's API keys. You can also suspend or delete the Integration user. This will delete any API Keys used by that user.
You can use API keys by: