API settings

Prev Next

The API tab serves as the interface where you can view API credentials, explore functionalities, and set access restrictions.

API key and secret

The API tab opens the page where you can retrieve the API key and secret necessary for establishing connections between your loyalty program and other integrated services, such as a newsletter provider.

For security reasons, the API secret is only accessible at the time of credential generation and is subsequently hidden from the Management UI. It’s essential to copy and securely store this information in case you need it in the future.

Please be aware that generating new API credentials will deactivate all existing connections until the new credentials are entered.

API Browser

You can also find a link to the API browser on this page, allowing your developer to browse the available API methods.

  • Events: Submit API events.

  • Customers: Access endpoints of the Customer API.

  • Errors: Review the complete content of requests and Antavo’s responses to failed API calls.

For security reasons, customer passwords included in requests are never exposed in the logs.

Read more in the API documentation.

IP Filter

Under the IP filter tab, you can define specific IP addresses that can access each API endpoint.

This tab is accessible only when the IP filter module has been enabled in the Management UI. Please contact the Antavo Service Desk for assistance in activating this module.

  • Select the API endpoint from the dropdown list

  • Click +

  • Paste the IP address or IP range (using CIDR notation) that you wish to authorize
    Click the corresponding + button to add multiple addresses or ranges.
    E.g., if you add 192.168.1.2 and 192.168.0.3/24, only the 192.168.1.2 and range of 192.168.0.[0-255] IP addresses will be permitted. Otherwise, the endpoint will respond with a forbidden exception.

  • Click Update to save your settings

You can remove filters anytime using the X button.

Signature enforcement

The Signature enforcement tab is accessible only when the API signature check module is enabled. Please contact the Antavo Service Desk if you want to start using this feature.

If signature enforcement is enabled for an API endpoint, requests made with plain API keys will be rejected due to an authentication error. Only requests with proper signatures will be accepted and recorded. Learn how to add signatures to your API requests in the developer documentation. Use the checkboxes to enable signature enforcement for any of the available endpoints.

  • Challenges API  LEGACY

  • Clubs API

  • Coupons API

  • Customer API

  • Display API

  • Entities API

  • Events API

  • FAQ API

  • Offers API

  • Rewards API

  • Points preview API (formerly known as Workflow Campaigns API)

Before leaving the page, ensure you click Update to apply and save your changes.

Authentication Manager

The Authentication Manager allows you to create and manage credentials used for token-based authentication in the Antavo Loyalty Cloud.

These credentials are required to generate access tokens via the /v1/auth/token endpoint.
Currently, token-based authentication is used by the Async Events API, and support for additional APIs may be added in the future.

Through this interface, you can:

  • create authentication clients

  • define what APIs they can access

  • control token behavior and validity

  • revoke access when credentials are no longer needed

  • audit authentication-related activity

Authentication Clients

On this tab, you can create new authentication clients and manage existing ones.

Generate a new Authentication Client

To create a new authentication client:

  • Click Generate new Auth Client in the top-right corner of the Authentication Manager.

  • A configuration pop-up will appear where you can define how the client should behave.

    • Name
      A human-readable name for the authentication client.
      Use a clear and descriptive name to make the client easy to identify later on the Management UI.

    • Purpose
      A short description explaining why the authentication client is created (for example, sending async events requests).
      This field helps with long-term maintainability when multiple clients exist.

    • Expiration date
      Defines when the authentication client expires.
      After this date, the client can no longer be used to generate new access tokens.

    • Token issuer
      Identifies the issuer of the token. This value is automatically set by the system and cannot be modified.

    • Scope
      Defines which APIs the generated access tokens can be used for.
      Currently, only the loyalty.async_events scope is supported.

    • Token audience
      Defines the target service or API that the token is intended for.
      This ensures tokens are accepted only by the appropriate backend services.

  • Click Generate to create the authentication client.

Once the client is generated:

  • The client secret is displayed once in a pop-up window. Make sure to store it securely, as it cannot be retrieved later.

  • The client ID remains visible in the authentication client list and can be accessed at any time.

Authentication Clients list

After creating authentication clients, you can manage them from the list under the Authentication Clients tab. You can find the following information:

  • Client ID
    Displays the client name provided during creation, along with the generated client ID.
    The client ID can be copied with a single click and is used as the client_id when requesting an access token via the /v1/auth/token endpoint.

    The current status of the client is also shown here:

    • Active: the client can be used to generate access tokens

    • Revoked: the client has been revoked and can no longer be used

    • Expired: the client has expired and can no longer be used

  • Purpose
    Describes the intended use of the authentication client, as provided during client creation.

  • Expires At
    The date when the authentication client expires. This value is calculated based on the token validity settings defined during client creation.

  • Scope
    Defines which APIs the client can access. This is selected during client creation.

  • Token validity
    Specifies how long access tokens issued by this client. This value is automatically determined based on the environment and cannot be modified.

  • Token issuer
    The issuer associated with the tokens generated by this client. ez ugye automatikus az environment alapján

  • Token audiences
    The service or API the token is intended for. This is selected during client creation.

  • Created At
    The date and time when the authentication client was created.

  • Created By
    The Management UI that created the authentication client.

Revoke access

If an authentication client is no longer needed, the access can be revoked.

To revoke an authentication client:

  1. Open the hamburger menu at the end of the client’s row.

  2. Select Revoke access.

  3. Confirm the action in the pop-up.

Revoking an authentication client is irreversible. Once revoked, the client can no longer be used to generate access tokens.

Audit logs

The Audit logs section provides visibility into authentication-related activities. It helps you track when authentication clients are created or revoked, and when access tokens are issued or rejected by the authentication endpoint.

This information is useful for troubleshooting, security reviews, and operational monitoring.

Auth Client Audit Log

The Auth Client Audit Log records lifecycle events related to authentication clients. This log includes entries when an authentication client is created or revoked.

  • ID
    The unique identifier of the audit log entry.


    Next to it, the related Auth Client ID is displayed and can be copied. This identifies the authentication client that was created or revoked.

  • Action
    The action performed on the authentication client. Create or revoke.

  • Source
    Indicates where the action was performed.

  • Created At
    The date and time when the action occurred.

  • Created By
    The user who performed the action.

JWT Token Audit Log

The JWT Token Audit Log tracks token-related events that occur when the authentication endpoint is called using authentication client credentials. This log records all successful access token generation and failed token generation attempts.

  • ID
    The unique identifier of the audit log entry.
    Next to it, the related Auth Client ID is displayed and can be copied. This identifies which authentication client was used when the token was requested.

  • Action
    Describes the outcome of the token request.
    Possible values include:

    • Issued: an access token was successfully generated

    • Error: the token generation failed

  • Created At
    The date and time when the log entry was created.

  • Metadata
    Contains technical identifiers related to the token request.

  • Error
    Present only if token generation failed. Includes the error message and error code returned by the authentication endpoint.