What It Does
The Credentials API provides RPCs for creating, revoking, and rotating API credentials used by external integrations to authenticate with MintID.Who It’s For
Brand administrators and developers who manage programmatic access to the MintID platform.create_api_credential_record
What it does
Creates a new API credential for the specified brand. The caller provides a client ID and a hashed client secret — plaintext secrets are never sent to or stored by the server.Request
Response (example)
Errors (examples)
- Not authenticated — request has no valid JWT or the token has expired.
- Forbidden — caller does not have admin or owner access to the specified brand.
- Invalid input — missing required fields or invalid parameter values.
revoke_api_credential_record
What it does
Permanently revokes an API credential. Revoked credentials can no longer authenticate. Revocation cannot be undone — create a new credential if access is needed again.Request
Response (example)
Errors (examples)
- Not authenticated — request has no valid JWT or the token has expired.
- Forbidden — caller does not have admin or owner access to the specified brand.
- Invalid input — credential ID not found or request is malformed.
rotate_api_credential_secret_record
What it does
Replaces the secret hash on an existing credential without revoking it. The credential remains active with the new secret. Cannot be used on revoked credentials.Request
Response (example)
Errors (examples)
- Not authenticated — request has no valid JWT.
- Forbidden — caller does not have sufficient access for this operation.
- Invalid input — request is malformed or cannot be processed.
Limits & Notes
- All credential RPCs require authentication with admin or owner role.
- Client secrets are never stored in plaintext — only hashed values are accepted.
- Revocation is permanent and cannot be undone.
- Rotation updates the secret without changing the client ID or metadata.
- Credentials can optionally have an expiry date; expired credentials are treated as inactive.