The Armature MCP endpoint authenticates requests using API keys issued from your Armature organization settings. You pass the key as a Bearer token in the HTTPDocumentation Index
Fetch the complete documentation index at: https://docs.armature.tech/llms.txt
Use this file to discover all available pages before exploring further.
Authorization header on every request. There are no session cookies, no OAuth flows, and no per-request login steps—your MCP client sends the header automatically once the key is configured.
Token format
amt_ prefix identifies the token as an Armature API key. The key ID and secret are both included in the single token string you copy from the dashboard.
Creating an API key
Create a new key
Click Create API key, give it a descriptive name, and confirm. The key is generated immediately.
Keys are scoped to your organization and frozen to the issuing user’s role at creation time. If the user’s role changes later, the key continues to carry the role it was created with. Choose the appropriate role for the agent’s intended access level before creating the key.
Using the key in curl
headers:
Revoking a key
To revoke a key, go to Settings → API keys, find the key by name, and click Revoke. Revoking deletes the hash row immediately. Any MCP request that arrives after revocation—even one already in flight—receives a401 unauthenticated response.
Keeping secrets out of tool arguments
This restriction exists to prevent accidental credential leakage through tool call logs, agent traces, and run artifacts. TheAuthorization header is handled at the transport layer and is never echoed into Armature’s run evidence or audit records.
Next steps
- See Roles to understand which tools and operations your key’s role can access.
- Manage your keys at Settings → API keys.