Authentication
The Dupify API uses API keys to authenticate requests. You can manage your API keys from your developer dashboard.
Getting an API Key
- Create a free account or sign in to your existing account
- Navigate to the API Keys section in your dashboard
- Click Generate New Key
- Give your key a descriptive name (e.g., "Production" or "Development")
- Select the scopes your key needs access to
- Copy your key immediately—you won't be able to see it again
Important: Your API key grants access to your account. Keep it secure and never expose it in client-side code or public repositories.
Key Format
API keys follow this format:
fe_live_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
fe_— Feature extraction API prefixlive_— Production key (ortest_for testing)- 32-character random string
Using Your API Key
Include your API key in the X-API-Key header with every request:
curl -X POST https://www.dupifyapp.com/v1/embed \
-H "X-API-Key: fe_live_xxxxx..." \
-H "Content-Type: application/json" \
-d '{"image_url": "https://..."}'
Or use the Authorization header with Bearer token:
-H "Authorization: Bearer fe_live_xxxxx..."
API Key Scopes
When creating an API key, you can limit its access to specific endpoints:
| Scope | Access |
|---|---|
| embed | Generate CLIP embeddings |
| colors | Extract dominant colors |
| silhouette | Generate silhouette embeddings |
| attributes | Detect product attributes |
| batch | Unified multi-operation batch processing |
| catalog | Manage and search your product catalog |
A key with no scopes selected has access to all endpoints. Select specific scopes to create more restricted keys for different use cases.
Key Management
From your dashboard, you can:
- View all keys — See creation date, last used, and scopes
- Revoke keys — Immediately invalidate a compromised key
- Regenerate keys — Create a new key with the same settings
- Monitor usage — Track API calls per key
Security Best Practices
- Never commit API keys to version control
- Use environment variables to store keys
- Create separate keys for development and production
- Use the minimum scopes necessary for each key
- Rotate keys periodically
- Revoke unused keys immediately