API Authentication
The BrikSync PropOS API supports a hybrid authentication model:- API keys — for programmatic integrations, external tools, and server-to-server workflows. Available on the BUSINESS plan.
- Session tokens — Supabase JWT tokens used automatically by the BrikSync web application. You do not need to manage these directly.
Authorization header. For external integrations, use an API key.
API key access is available on the BUSINESS plan. If you are on the FREE or PRO plan,
upgrade from Settings → Billing before generating API keys.
Generating an API Key
- Log in to briksync.com as an Admin or Super Admin.
- Go to Settings → API Access.
- Click Generate New API Key.
- Give the key a descriptive name — e.g. “CRM Integration” or “Accounting Sync”.
- Click Create Key.
- Copy the API key immediately and store it securely.
Making Authenticated Requests
Include your API key in theAuthorization header of every request using the Bearer token scheme.
Request Header Format
Example Request
YOUR_API_KEY with your actual API key.
Authentication Errors
If your API key is missing or invalid, the API returns an error in the standard envelope format:Managing API Keys
From Settings → API Access you can:- View all API keys — see the name, creation date, and last used date for each key.
- Rename a key — update the label for clarity.
- Revoke a key — immediately invalidate a key. Any integration using a revoked key will stop working.
Revoking a Compromised Key
If you suspect an API key has been exposed or misused:- Go to Settings → API Access.
- Click Revoke next to the compromised key.
- Generate a new key and update your integration.
Best Practices for API Key Security
- Never hardcode API keys in your application source code.
- Store keys in environment variables or a secrets management service (e.g. AWS Secrets Manager, HashiCorp Vault, Doppler).
- Use separate keys for different integrations or environments — this makes it easier to rotate a key without affecting all integrations.
- Rotate keys regularly — generate a new key and revoke the old one periodically as a security practice.
- Monitor key usage — review the last used date in Settings → API Access to identify keys that are no longer in use and can be safely revoked.
IP Allowlisting
For additional security, you can restrict an API key to only accept requests from specific IP addresses.- Go to Settings → API Access.
- Click the key you want to restrict.
- Click Add IP Restriction.
- Enter the allowed IP address or CIDR range (e.g.
203.0.113.0/24). - Click Save.
401 error, even with a valid key.
Session-based authentication
The BrikSync web application authenticates users via Supabase sessions. When you log in through the browser, a JWT token is issued and managed automatically — you do not need to handle it manually. Session-based auth is used by:- The BrikSync dashboard and all browser-based workflows
- OAuth and email verification callbacks (
/api/auth/callback) - Cron endpoints (authenticated via
CRON_SECRET, not user sessions) - Stripe webhooks (authenticated via Stripe signature verification, not user sessions)
If you are building an external integration, use an API key instead of session tokens. Session
tokens are short-lived and intended for browser use only.
Next Steps
Now that you have authenticated, explore the available resources in the API Overview.Built by Errsol Technologies LLP · Karan · BrikSync PropOS