The Reply API uses Bearer token authentication. Every request must include anDocumentation Index
Fetch the complete documentation index at: https://docs.reply.io/llms.txt
Use this file to discover all available pages before exploring further.
Authorization header with your Reply API key.
Get your API key
Sign in
Log in to your Reply.io dashboard.
Authenticate a request
Pass the key as a Bearer token in theAuthorization header:
curl
Verify your setup
Call/v3/whoami to confirm the credentials are valid. A successful response
returns your user ID:
Unauthorized response
If theAuthorization header is missing, malformed, or contains a revoked or
unknown token, the API returns 401 Unauthorized with an empty body.
The response advertises the expected scheme in the WWW-Authenticate header:
Master API key
The Master API key provides centralized, team-level access to the Reply API. Unlike a per-user key (which authenticates as the single user it belongs to), a master key can act on behalf of any user inside the workspace it was issued for — useful for team-wide automation, cross-user reporting, and bulk operations.Availability
- Workspace-scoped only. A master key authenticates calls within the single workspace it was generated in. Organization-level master keys — a single credential spanning every workspace in an organization — are coming soon.
Permissions and access control
- The master key can be generated and viewed only by the workspace owner.
- It must be generated manually the first time — there is no auto-issue on workspace creation.
- The master key is unique per workspace.
Keeping your key safe
- Never commit your API key to source control or paste it into public chats.
- Rotate the key from Settings → API Key if you suspect it was exposed.
- Use a separate key per integration so you can revoke one without disrupting the others.