API keys let you authenticate clients that call the bridge’s OpenAI-compatible endpoint. Each key is independent: it has its own name, secret value, rate limit, and usage counter visible in the dashboard. You can create as many keys as you need — one per application, per user, or per environment.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/cloudwaddie/lmarenabridge/llms.txt
Use this file to discover all available pages before exploring further.
How clients use API keys
Clients send the key in the standardAuthorization header:
Key structure
Each entry in theapi_keys array has four fields:
| Field | Type | Description |
|---|---|---|
name | string | Human-readable label shown in the dashboard. |
key | string | The secret bearer token. Auto-generated when created via the dashboard. |
rpm | integer | Requests per minute allowed for this key. Defaults to 60. |
created | integer | Unix timestamp (seconds) when the key was created. |
60-second window (RATE_LIMIT_WINDOW_SECONDS = 60). When a key exceeds its rpm limit within that window, the bridge returns 429 Too Many Requests.
Creating keys
- Dashboard
- config.json
- Open the dashboard at
http://localhost:8000/dashboardand log in. - Find the API Keys section.
- Enter a name for the new key and click Create Key.
- The dashboard sends
POST /create-keywith the name, generates a random key value, and immediately saves it toconfig.json. - Copy the generated key — it is shown once on creation.
The key value is a securely generated random string. You cannot
choose your own value through the dashboard; edit
config.json directly
if you need a specific value.Deleting keys
- Dashboard
- config.json
- Open the API Keys section in the dashboard.
- Click Delete next to the key you want to remove.
- The dashboard sends
POST /delete-keyand the entry is removed fromconfig.jsonimmediately.
Rotating keys
There is no built-in rotation endpoint. To rotate a key:- Create a new key via the dashboard or
config.json. - Update your clients to use the new key.
- Delete the old key once traffic has migrated.
Rate limits
Each key enforces its own request rate independently. The default limit is 60 requests per minute, controlled by two constants in the bridge:rpm field in
config.json or use the dashboard. Changes take effect on the next request
without a server restart.
Usage statistics
Per-key request counts are stored in theusage_stats field of config.json
and are visible in the dashboard. The dashboard shows the total request count
and top models used per key.
To reset counters, set "usage_stats": {} in config.json while the server
is stopped, then restart.