Authentication & Security
Learn how to authenticate with Agent-CoreX and secure your implementation.Authentication Methods
Agent-CoreX supports multiple authentication methods:| Method | Use Case | Security |
|---|---|---|
| API Key | SDKs, backends | High |
| OAuth | Web apps, user context | Very High |
| JWT | Service-to-service | High |
| Webhook Signing | Event verification | High |
API Key Authentication
Recommended: Header-based
Alternative: Query parameter
OAuth Authentication
For web applications handling user requests:JWT Authentication
For service-to-service communication:Webhook Signing
Verify webhook authenticity:Security Best Practices
1. Key Rotation
2. Least Privilege
3. Environment Separation
4. Rate Limiting
5. HTTPS Only
Error Handling
Unauthorized (401)
Forbidden (403)
Security Checklist
- ✅ Use HTTPS always
- ✅ Store keys in environment variables
- ✅ Rotate keys monthly
- ✅ Use different keys per environment
- ✅ Monitor API usage
- ✅ Verify webhook signatures
- ✅ Implement rate limiting
- ✅ Use least privilege principle
- ✅ Enable audit logging
- ✅ Never commit keys to git
Compliance
Agent-CoreX complies with:- SOC 2 Type II - Security and availability
- GDPR - Data privacy in EU
- HIPAA - Healthcare data handling
- ISO 27001 - Information security management
Support
Security questions? Email: security@agent-corex.comNext Step: Back to Guides →