Security & API Keys
Protect your account with two-factor authentication, manage active sessions, create API keys for programmatic access, and review the complete audit trail.
Two-Factor Authentication
Two-factor authentication (2FA) adds a second layer of security to your account. After entering your password, you also need a time-based code from your authenticator app.
Enabling 2FA
Go to Settings → Security
Click "Enable 2FA"
Enter the verification code
Save recovery codes
Save your recovery codes
Disabling 2FA
Go to Settings → Security, click Disable 2FA, and confirm with your current password. 2FA is removed immediately.
Session Management
The Sessions section shows all active sessions for your account — every device and browser where you are currently logged in.
| Field | Description |
|---|---|
| Device | Browser name and version. |
| IP address | The IP address of the session. |
| Location | Approximate geographic location based on IP. |
| Last active | When the session was last used. |
| Created | When the session was created (login time). |
Revoking Sessions
Click Revoke next to any session to terminate it immediately. The user on that device will be logged out on their next request.
Use Revoke All Other Sessions to log out of every device except the one you are currently using. This is recommended if you suspect unauthorized access.
API Keys
API keys allow programmatic access to the A91I API. Use them to trigger workflows, read execution results, and manage resources from scripts, CI/CD pipelines, or other applications.
Creating an API Key
Go to Settings → Security → API Keys
Click "Generate New Key"
Configure the key
Copy the key
Permission Scopes
Each API key can be restricted to specific permissions:
- Workflows
- Read, create, edit, and delete workflows.
- Executions
- Trigger executions and read execution results.
- Connections
- Read connection statuses (not credentials).
- Organization
- Read organization settings and member list.
Least privilege
Managing Keys
The API Keys list shows all active keys with their prefix (first 8 characters), creation date, last used timestamp, and usage count.
- Revoke — disable a key immediately. Any requests using the key will be rejected.
- Rotate — revoke the old key and create a new one in a single step. Update your application with the new key.
- Monitor — check the 'last used' and 'usage count' columns to identify unused or over-used keys.
Using API Keys
Include the API key in the Authorization header:
Authorization: Bearer your-api-key-here
All API endpoints that accept user authentication also accept API key authentication. The key inherits the permissions of the user who created it, further restricted by the key's configured scopes.
Audit Log
The audit log records every significant action in your organization. Navigate to Settings → Audit Log to browse the full history.
What Is Logged
| Event | Examples |
|---|---|
| User actions | Login, logout, password change, 2FA enable/disable. |
| Workflow actions | Create, edit, delete, share, execute, version restore. |
| Connection actions | Create, update, delete, share, test. |
| Team actions | Invite, accept invitation, role change, removal. |
| Settings actions | Organization update, billing change, API key create/revoke. |
Audit Entry Fields
Each audit log entry includes:
- Timestamp — when the action occurred.
- User — who performed the action.
- Action — the type of action (create, update, delete, etc.).
- Resource — what was affected (workflow, connection, user, etc.).
- Changes — the before and after values for update actions.
- IP address — the source IP of the request.
- User agent — the browser or client that made the request.
Filtering the Audit Log
Use the filter controls to narrow results:
- Action type — filter by create, update, delete, execute, etc.
- Resource type — filter by workflow, connection, user, etc.
- Date range — limit to a specific time period.
- User — show actions by a specific team member.
Compliance
Security Best Practices
- Enable 2FA for all Admin and Owner accounts.
- Use strong, unique passwords. A91I enforces a minimum of 8 characters with letters and numbers.
- Review active sessions regularly and revoke any you do not recognize.
- Create API keys with the minimum required scopes.
- Set expiration dates on API keys used for temporary integrations.
- Rotate API keys periodically (quarterly recommended).
- Monitor the audit log for unexpected activity — unusual login times, bulk deletions, or configuration changes.
- Revoke access for departing team members immediately.