The Connexease Gateway uses API keys to verify your identity on every outbound request. When the Gateway forwards events back to your server, it uses a webhook secret you define — so both directions are protected without any extra setup on your end.Documentation Index
Fetch the complete documentation index at: https://docs.gateway.connexease.com/llms.txt
Use this file to discover all available pages before exploring further.
API Key Authentication
Every request to/v1/wa/message must include your API key in the Authorization header. The Gateway checks this key before processing anything — rate limiting, billing, and message delivery all happen only after a valid key is confirmed.
| Prefix | Environment |
|---|---|
pk_ | Production |
sk_ | Staging / Development |
Example
Error Responses
If authentication fails, the Gateway returns one of the following errors before touching any other part of the pipeline:| Code | HTTP | Cause | Fix |
|---|---|---|---|
AUTH_002 | 401 | Authorization header missing entirely | Add the header to every request |
AUTH_003 | 401 | Not in Bearer <token> format | Ensure the Bearer prefix is present |
AUTH_001 | 401 | Key not found or expired | Verify the key in Dashboard → API Keys |
Securing Your Webhook Endpoint
When the Gateway forwards events to your server, it includes a secret in theAuthorization header — the same secret you set in Dashboard → Settings → Webhooks. This lets you confirm that the request genuinely came from the Gateway and not a third party.
Your endpoint receives requests in this shape:
Use a strong, randomly generated string (minimum 32 characters) as your webhook secret. Set it in Dashboard → Settings → Webhooks.
API Key Management
Creating and Revoking Keys
Keys are created and managed from Dashboard → Settings → API Keys. If a key is compromised, revoke it immediately and generate a new one — update your environment variables before restarting your service.Best Practices
- Use separate keys for production (
pk_) and staging (sk_) environments. - Pass keys via environment variables — never hardcode them in source files.
- Enable secret scanning in your CI/CD pipeline to catch accidental commits.