Termix API keys let you authenticate automated scripts, CI/CD pipelines, and third-party tools against the Termix REST API without using interactive login sessions. Each key is tied to a specific user account and inherits that user’s permissions. Keys can be given an expiration date and revoked at any time.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/Termix-SSH/Termix/llms.txt
Use this file to discover all available pages before exploring further.
API key management is an admin-only operation. An administrator must create and delete keys on behalf of users. If you need a key for your account, contact your Termix administrator.
How API keys work
When you create an API key, Termix generates a token prefixed withtmx_. The full token is shown to you once at creation time and is never stored in plaintext — Termix only retains a hash of the token for verification. If you lose the token, you must create a new key.
Each key has:
- A human-readable name to identify its purpose (for example,
github-actions-deployorbackup-script) - An optional expiration date — if set, the key stops working after that date and time
- A user scope — the key acts with the same permissions as the user it was created for
Creating an API key
Fill in the key details
Enter a descriptive name for the key. Select the user account the key should be scoped to. Optionally set an expiration date — leave it blank if you want the key to remain valid until manually revoked.
Using an API key in requests
Include the token in theAuthorization header of every API request using the Bearer scheme:
curl:
401 Unauthorized response.
Revoking an API key
Revoked keys are permanently deleted and cannot be reinstated. Any script or service using the key immediately loses access.Find the key to revoke
Locate the key by its name or the token prefix shown in the list (the first 12 characters of the token, for example
tmx_abc12345ef).Best practices
Name keys by their purpose
Name keys by their purpose
Use descriptive names that make it easy to identify which system or script uses a given key — for example,
ci-pipeline-staging or monitoring-readonly. This makes it easy to revoke the right key if a system is decommissioned or credentials are rotated.Set expiration dates for temporary access
Set expiration dates for temporary access
If a key is only needed for a limited period — for example, during a migration or for a short-lived automation job — set an expiration date. An expired key stops working automatically without requiring a manual revocation step.
Store tokens in a secrets manager
Store tokens in a secrets manager
Never commit API tokens to source control. Use your CI/CD platform’s secrets store (for example, GitHub Actions secrets, GitLab CI variables, or HashiCorp Vault) to inject the token as an environment variable at runtime.
Rotate keys regularly
Rotate keys regularly
Even without a fixed expiration date, periodically delete old keys and create new ones to limit the impact of a token being exposed. Each new key gets a new token, and the old one is immediately invalidated when deleted.