Create, rotate, and revoke API keys for MCP and REST access.
TL;DR — Create one key per client (Claude, ChatGPT, Zapier, etc.), store it in an env var, rotate when a device is compromised or when a teammate leaves.
Profile → API Keys → New key. Give it a name that identifies where it will be used (e.g. Claude Desktop — personal laptop). The 64-character key is shown once. Copy it immediately.
Send it in the x-api-key header on every request:
curl -H "x-api-key: $CUSTOMERMATES_API_KEY" \
-H "Content-Type: application/json" \
https://customermates.com/api/v1/mcp \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}'For MCP clients, the key goes into the MCP config:
~/.zshrc, 1Password, Bitwarden CLI, or your OS keychain.Profile → API Keys → click the key → Rotate. A new key is generated and the old one is invalidated immediately. Update every client that had the old key.
Same place → Revoke. Invalidates the key without generating a new one. Use when you don't plan to replace it.
Customermates keys are 64 characters, base62 (a-z A-Z 0-9). Shorter strings in the database from earlier seed data are not valid keys; regenerate them if you see them in your account.
Every key inherits the permissions of the user it belongs to. If a user is demoted from Admin to Member, their keys lose admin capabilities on the next call. There is no separate permission scoping per key today.