Orkesta uses bearer token authentication. Every API request must include your API key in theDocumentation Index
Fetch the complete documentation index at: https://docs.orkesta.com.tr/llms.txt
Use this file to discover all available pages before exploring further.
Authorization header. Requests without a valid key are rejected with a 401 error.
How it works
When you create an API key in your Orkesta workspace, Orkesta generates a unique secret token scoped to your account. You pass this token with every request. Orkesta validates it against your workspace on each call — there are no session cookies or OAuth flows for server-to-server use. You can generate multiple keys with different scopes and expiry dates, and revoke any key at any time without affecting others.Passing your API key
Include your API key as a bearer token in theAuthorization header:
Generating an API key
Sign in to your Orkesta workspace
Go to orkesta.com.tr and sign in with your account credentials.
Create a new key
Click New key. Enter a descriptive name (for example,
production-erp-integration) and set an optional expiry date. Select the appropriate scope for this key, then click Create.Key scopes
Each API key is assigned one of three scopes that determine what it can access.| Scope | Description |
|---|---|
read-only | Can retrieve data (accounts, payments, reports) but cannot create, update, or delete any resources. Use for dashboards and read-only integrations. |
read-write | Can read and write all payment and integration resources. Suitable for most server-side integrations, including creating payments and configuring webhooks. |
admin | Full access, including workspace settings, user management, and API key management. Restrict this scope to internal tooling only. |
Rotating API keys
Rotate keys periodically or immediately if you suspect a key has been compromised.Generate a new key
Follow the steps in Generating an API key to create a replacement key with the same scope.
Update your integration
Deploy the new key to all services that use the old one. Update your environment variables or secrets manager entries before proceeding.
Verify the new key works
Make a test request using the new key — for example,
GET /accounts — and confirm you receive a 200 response.Error responses
The following HTTP status codes indicate authentication or authorization problems.| Status code | Error | Cause |
|---|---|---|
401 Unauthorized | Missing or invalid API key | The Authorization header is absent, malformed, or the key does not exist or has been revoked. |
403 Forbidden | Insufficient scope | The key is valid, but its scope does not permit the requested action. Use a key with a higher scope. |
429 Too Many Requests | Rate limit exceeded | Your key has exceeded the allowed request rate. Back off and retry after the interval indicated in the Retry-After response header. |
