The account endpoints underDocumentation Index
Fetch the complete documentation index at: https://mintlify.com/calagopus/panel/llms.txt
Use this file to discover all available pages before exploring further.
/api/client/account let you read and update your own profile, manage API keys, configure two-factor authentication, and review active sessions.
Get account
Returns the full profile of the authenticated user.The authenticated user’s profile.
- curl
- Response
Update account
Updates profile fields for the authenticated user. All fields are optional; only provided fields are changed.New username. 3–15 characters, alphanumeric and underscores only.
First name. 2–255 characters.
Last name. 2–255 characters.
UI language code. 2–15 characters. Only accepted if the panel allows language changes.
Notification position. One of
top_left, top_center, top_right, bottom_left, bottom_center, bottom_right.Whether the server list opens in grouped view by default.
account.infos
Change password
Updates the account password. Requires the current password for verification.The account’s current password.
The new password.
Must match
password.account.password
Logout
Destroys the current session (when authenticated via session cookie).API keys
List API keys
Page number.
Items per page.
Filter by key name.
api-keys.read
List of API key objects.
Create an API key
Key name. 3–31 characters.
Allowed IP addresses or CIDR ranges. Empty array allows all IPs.
User-level permissions to grant. Must be a subset of your own permissions.
Admin-level permissions to grant. Must be a subset of your own permissions.
Server-level permissions to grant. Must be a subset of your own permissions.
Optional ISO 8601 expiry datetime. Must be in the future.
api-keys.create
The response includes a key field with the full API key value. This is returned only once.
Delete an API key
UUID of the API key to delete.
api-keys.delete
Two-factor authentication
Begin 2FA setup
Generates a TOTP secret and OTP URL to display as a QR code.otpauth:// URL to encode as a QR code for authenticator apps.Base32-encoded TOTP secret for manual entry.
409 Conflict if 2FA is already enabled.
Required permission: account.two-factor
Enable 2FA
Confirms the TOTP setup with the first valid code.6-digit TOTP code from your authenticator app.
Current account password for verification.
account.two-factor
Disable 2FA
Either a 6-digit TOTP code or a 10-character recovery code.
Current account password.
account.two-factor
Sessions
List sessions
Revoke a session
UUID of the session to revoke.