API Keys
API keys authenticate non-interactive callers — CI pipelines, scripts, automated agents — without going through the browser OAuth flow. They inherit the permissions of the user who created them.
For interactive use, prefer islo login (see Authentication). API keys are for when you can’t open a browser.
Quick Reference
Alias: islo key works as a shortcut for islo api-key.
All subcommands accept --output json for structured output.
Creating Keys
By default, the secret is copied to your clipboard and never appears on screen. The key value is only shown once at creation; store it before closing the terminal.
Examples:
Listing Keys
Prints a table with each key’s id, name, status (active/inactive), expiration, and creation time. The secret value is not retrievable after creation — list only shows metadata.
Deactivating and Activating
Deactivating disables a key without losing its identity — useful when you suspect a leak and want to break the key immediately but keep its audit trail.
Deactivated keys reject every request until reactivated.
Deleting
Deletion is permanent — there is no undo. If you only want to suspend a key, use deactivate instead.
Using a Key
Set the ISLO_API_KEY environment variable. The CLI picks it up automatically and skips the OAuth flow.
Or pass it inline for one command:
CI/CD example
Notes
- The key is shown exactly once. There is no command that re-prints an existing key’s value.
- Keys inherit the creator’s permissions. Use separate keys per workload so you can deactivate one without breaking others.
- Rotate keys on a schedule by creating a new key, updating your secret store, then deleting the old one.