API keys are bearer tokens that authenticate MCP clients against the Armature MCP endpoint atDocumentation Index
Fetch the complete documentation index at: https://docs.armature.tech/llms.txt
Use this file to discover all available pages before exploring further.
/api/mcp. Any MCP client — whether an AI agent, a CI pipeline, or a custom integration — includes the token in its HTTP request headers. Armature validates the token, identifies your organization, and enforces the role permissions that were active when the key was created.
Token format
Every Armature API key follows this structure:amt_ prefix makes Armature tokens easy to identify in logs and secret scanners. The key ID portion (abc123) is stored in the dashboard and used to identify which key a request came from. The secret portion is never stored in plaintext — Armature stores only a secure one-way hash of it and cannot retrieve the original value.
Creating an API key
Go to Settings → API keys
Open Settings in the Armature sidebar and select API keys from the section navigation.
Name the key
Enter a descriptive name in the Key name field. Choose a name that identifies the client or purpose, for example
prod-mcp-agent or ci-regression-runner. A good name makes it easy to identify which key to revoke if a client is decommissioned.Click Create key
Click Create key. Armature generates the token and displays the full
amt_... value in a New token box above the key list.Using a key with the MCP endpoint
Pass the token as a standard HTTPAuthorization header on every request to /api/mcp:
curl:
Authorization header configuration for HTTP transport. Consult your client’s documentation for the exact configuration key.
Key details in the dashboard
The API keys section lists all active keys for your organization. For each key you can see:| Field | Description |
|---|---|
| Name | The label you gave the key at creation time. |
| Token prefix | The amt_<key-id>... prefix, enough to identify the key without exposing the secret. |
| Role | The organization role frozen at creation time. |
| Created | When the key was created. |
| Calls | Total number of MCP requests authenticated with this key. |
| Last used | Timestamp of the most recent authenticated request. |
Key scoping and roles
Each key is scoped to the organization it was created in and cannot be used across organizations. The key inherits a snapshot of your role at the moment of creation. If your role changes after you create a key, the key continues to enforce the original role until it is revoked and replaced.If you need a key with a different role level — for example, a read-only viewer key for a monitoring agent — ask a workspace admin to create the key while logged in under the target role, or adjust your role first and then create the key.
Revoking a key
Click Revoke next to any key in the list and confirm the dialog. Armature deletes the scrypt hash row immediately. Any MCP client still using the revoked token will receive a401 Unauthenticated response on the next request.
Related
- MCP API overview — the full reference for Armature MCP tools, resources, and prompts.