Authentication
How authentication and API keys work in Forge.
Authentication
All Forge API requests require authentication via an API key. Keys are scoped to your account and can be managed from the dashboard.
API Key Format
Forge API keys follow the format forge_sk_<random>. The sk prefix indicates a secret key that should never be exposed in client-side code.
Using Your Key
Pass your API key in the Authorization header as a Bearer token:
Authorization: Bearer forge_sk_your_key_here
Key Management
- Create: Dashboard → API Keys → Create Key
- Rotate: Create a new key, update your applications, then delete the old key
- Revoke: Delete a key immediately from the dashboard. Revocation takes effect within seconds.
- Scopes: Keys can be scoped to specific endpoints (e.g., read-only, chat-only, admin)
Dashboard Authentication
The Forge Dashboard uses Clerk for authentication, supporting email/password, Google OAuth, GitHub OAuth, SSO/SAML (Enterprise tier), and SCIM provisioning (Enterprise tier).
Enterprise: SSO & SCIM
Enterprise customers can configure SAML-based Single Sign-On and SCIM user provisioning. Contact the sales team or configure SSO directly from Dashboard → Settings → Authentication.
Security Best Practices
- Never commit API keys to version control
- Use environment variables or a secrets manager
- Rotate keys periodically (every 90 days recommended)
- Use scoped keys with minimum required permissions
- Monitor key usage in the dashboard for anomalies