Provisioning Keys
Provisioning Keys are special-purpose administrative tokens used to securely create, update, list, and delete Service Account Keys within your organization.
Provisioning Keys Overview
Not for LLM Requests: Provisioning Keys cannot be used to call model endpoints or route completions.
Org-Level Admin Only: Only Organization Owners can generate and manage Provisioning Keys.
Service Key Management: These keys provide full lifecycle control over Service Account Keys — including scoped permissions, rate limits, expiration, and metadata.
Use Cases
Provisioning Keys are ideal for:
Automating API key management
Managing non-user-bound access (e.g., for CI/CD pipelines)
Setting granular controls on model usage, budgets, and project tagging
API Endpoints
Create a Service Account Key
curl 'https://api.fastrouter.ai/prod/createServiceKey' \
-H 'accept: application/json' \
-H 'accept-language: en-US,en;q=0.9' \
-H 'authorization: Bearer PROVISIONING-KEY' \
--data-raw '{
"org_id": "ORG-ID",
"api_key_name": "SERVICE-KEY-NAME",
"credit_limit": null,
"reset_budget_interval": null,
"expire_key": null,
"models": null,
"tpm_limit": null,
"rpm_limit": null,
"meta_data": null,
"tags": null
}'The response includes the secret Service Account Key and its one-way hash, which you'll need for future updates or deletion.
Note: The following fields in the createServiceKey payload are optional:
credit_limitreset_budget_intervalexpire_keymodelstpm_limitrpm_limitmeta_datatags
These can be omitted entirely or set to null depending on your provisioning use case. Only org_id and api_key_name are required.
Update a Service Account Key
List Service Account Keys
Delete a Service Account Key
Notes
Ensure your
PROVISIONING-KEYis stored securely. It has high privileges.For
metadata, you can store custom info likeuser_id,team_name, ordeployment.tagshelp in grouping and filtering keys by project or environment.
Last updated