Access Management
API Keys
Secure and granular access control for your Prizm connectors.
Secret Keys
Secret keys are intended to be kept private and should never be exposed in client-side code or public repositories.
Scoped Access
Implement least-privilege principles by creating keys scoped to specific project environments.
Best Practices
- Never commit API keys to version control systems.
- Use environment variables to store secrets securely.
- Rotate keys regularly to minimize exposure risk.
- Monitor usage patterns for anomalous activity.
Security Audit
View full access history in Organization Logs.