Authentication
Remem uses two auth models:- API keys (
vlt_...) for data-plane endpoints (/v1/query,/v1/documents/*,/v1/dsar/*). - Portal JWT bearer tokens for management endpoints (
/v1/orgs/*,/v1/tenants/*,/v1/auth/*,/v1/namespaces/*).
Data Plane: API Keys
Use either header format:How to get an API key
- Fastest path:
POST /public/signupreturns your first API key. - Additional keys: create/revoke via
/v1/auth/api-keysusing a portal JWT.
API key sensitivity scope
Each key has a max sensitivity level:| Level | Can read |
|---|---|
public | Public only |
internal | Public + internal |
confidential | Public + internal + confidential |
personal | All levels |
API key namespace scope
API keys are also namespace-scoped.- Each key can have a default namespace for write calls that omit
namespace. - Each key can have per-namespace grants:
read_writeread_only
- Reads without an explicit
namespacesfield search all namespaces the key can read.
If you omit
scopes on key creation, Remem grants read_write on the workspace’s default namespace. See Namespaces for the full model.Management Plane: Portal JWT
Management endpoints require non-API-key bearer JWTs. Examples:/v1/orgs/*/v1/orgs/{org_id}/members/*/v1/orgs/{org_id}/invites/*/v1/tenants/*/v1/tenants/{tenant_id}/members/*/v1/auth/api-keys*/v1/namespaces/*/v1/auth/password-reset/*(public reset flow endpoints themselves are unauthenticated)
Public Endpoints (No Auth)
GET /GET /healthGET /health/liveGET /health/readyGET /health/servicesPOST /public/signupPOST /v1/auth/password-reset/requestPOST /v1/auth/password-reset/confirm
Common 401 Errors
API key required...: you called a data-plane endpoint withoutvlt_key.Portal JWT required...: you called a management endpoint with an API key.Invalid JWT: malformed/expired portal token.Invalid API key: revoked or incorrectvlt_token.