Setup
Create an account, get your API key, and make authenticated requests in under two minutes.
This page gets you signed in, issued an API key, and making your first authenticated request.
Create an account and sign in
You’ll need to be signed in to generate an API key.
- If you have an account, go to the access page in the dashboard
- If you don’t have an account yet, sign up first and then go to the access page.
Get your API key
Once you are on the access page an API key will be generated for you. Copy this key and store it securely.
All requests are authenticated by passing your key in a header field called API-KEY
.
API Key Types
Secret Key (`sk_*`) - Server-Side Only
- Use Case: Server-to-server communication
- Security: Never expose to client applications
- Permissions: Full access to all endpoints
- Rate Limits: Based on subscription tier
Public Key (`pk_*`) - Client-Side Safe
- Use Case: Mobile app direct API access
- Security: Safe to embed in mobile apps
- Permissions: Read-only access to safe endpoints
- Rate Limits: Same as secret keys (based on subscription tier)
More information
More information about API key types with implementation examples can be found below.
Security best practice
- Do not expose API keys in client-side code or mobile apps
- Use environment variables/secret managers for server-side storage
- Scope usage and monitor via the dashboard
Rate limits
Rate limits depend on your plan. You’ll see current usage and remaining quota in the dashboard, and standard X-*
headers on responses.
Builder | Hobbyist | StartUp | Scale | Enterprise | |
---|---|---|---|---|---|
Requests per second | 1 | 2 | 5 | 25 | unlimited |
Requests per 24 hours | 300 | 1000 | 10000 | 100000 | unlimited |
Request pricing
We give all new customers £10 credit, giving you over 1600 requests to get started before you need to top up or upgrade to a paid plan.
Request type | Price per 1000 |
---|---|
Search | £6 |
Detail Basic | £8 |
Detail Advanced | £12 |
Venue Menus | £6 |
API Keys
This guide explains how to securely integrate the InBe API into mobile and client-side applications, following industry best practices for API key security. Server-side applications do not need to follow these patterns.
If you are unsure which pattern to use, we recommend the Server Proxy pattern.
Public keys
Public keys can only access read-only endpoints.
Recommended Integration Patterns
Pattern 1: Server Proxy
This pattern is recommended, particularly for large companies.
How it works:
- Mobile app → Your server → InBe API
- Secret key stored securely on your server
- Mobile app uses your own authentication
- Your server then makes the request to the InBe API using the secret key
sk_*
Benefits:
- Maximum security
- Full control over rate limiting
- Can add additional business logic
- Secret key never exposed
Limitations:
- Additional latency
- Additional complexity
Implementation:
Pattern 2: Direct API Access
This pattern can be used if have a smaller scale project or solution and you are not concerned about the security of your API key.
How it works:
- Mobile app → InBe API directly
- Public key embedded in mobile app
- Limited to read-only operations
Benefits:
- Simpler implementation
- Lower server costs
- Faster response times
Limitations:
- Public key can be extracted from app
Example Implementation:
More information
If your key is compromised, you can rotate ethier or both in the access page in the dashboard.
Security Best Practices
For Mobile Apps Using Public Keys
Obfuscation: Use code obfuscation to make key extraction harder
- Certificate Pinning: Implement SSL certificate pinning
- Runtime Checks: Add anti-debugging and root detection
- Monitoring: Monitor for unusual usage patterns
For Server-Side Integration
Environment Variables: Store secret keys in environment variables
- Access Logging: Log all API usage
- Rate Limiting: Implement your own rate limiting
- Error Handling: Don't expose internal errors to clients
Authentication errors
If authentication fails, you’ll receive a 401 response: