The Partner API uses long-lived API keys for authentication. Each key carries an explicit set of scopes that authorize specific endpoints.Documentation Index
Fetch the complete documentation index at: https://vantagesolutions.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Key format
Keys are issued in two halves joined by a literal dot:vck_— fixed prefix, identifies this as a VantageClaw Partner key.<key_id>— public identifier. Safe to log and reference in support tickets.<secret>— high-entropy secret. Never log, never commit, never share.
Authorization header on every request:
Scopes
A key’s scopes determine which endpoints it can call. Each endpoint requires exactly one scope.v1 scopes (real)
| Scope | Grants |
|---|---|
identity:read | GET /api/v1/partner/me |
webhooks:manage | All /api/v1/partner/webhooks/* endpoints |
identity:read scope is granted automatically to every key — it cannot be revoked while the key is active. This is the minimum scope required to verify an integration is wired correctly.
Reserved scopes
The following scopes are reserved for future API versions and are rejected at key-creation time with a422 response. They will become real when the corresponding endpoints ship:
leads:read,leads:writeintakes:read,intakes:writerecords:read,records:writeskills:read,skills:author,skills:executeagents:invoke,tenants:provision
Verifying your key
TheGET /api/v1/partner/me endpoint is the canonical integration health check. It works as long as your key is valid and active, and it does not require any specific scope beyond identity:read:
Rate limiting
Every key carries a per-minute rate limit, returned byGET /me under rate_limit_per_minute. Default is 600 requests/minute, keyed by organization. Sustained overage returns 429 Too Many Requests.
If you need a higher ceiling for a legitimate use case (bulk backfill, high-volume webhook test runs), contact us before designing around the default.
Key rotation
v1 ships a delete-and-recreate rotation model. There is no in-place rotation endpoint:- Request a new key from your VantageClaw contact, granted the same scopes as the old one.
- Update your integration to use the new key. Test against
GET /me. - Once the new key is in use, request revocation of the old key. The old key returns
401 Unauthorizedimmediately after revocation.
Lost or compromised secret
If you suspect the secret half has been exposed:- Immediately notify your VantageClaw contact so the key can be revoked.
- Provision a replacement key.
- Audit your logs for any traffic on the compromised key before revocation.
vck_<key_id> will never be re-issued. Any webhook deliveries already in flight at revocation time continue to be signed with their existing HMAC secret (webhook secrets are independent from the API key — see Webhook security).