Documentation Index
Fetch the complete documentation index at: https://docs.aethercitadel.cloud/llms.txt
Use this file to discover all available pages before exploring further.
Overview
If your API key is compromised or you want to rotate it as a security practice, this endpoint generates a fresh key and immediately deactivates the old one.
Update all your services before you rotate. The old key stops working the instant you call this endpoint — there is no grace period.
Request
Your current Aether Citadel API key (ack_live_...). This key will be invalidated.
No request body required.
Response
Your new API key. Update all environments that use the old key.
Confirmation message reminding you to update your integration.
Example
curl -X POST https://api.aethercitadel.cloud/v1/tenant/rotate-key \
-H "X-Citadel-Key: ack_live_YOUR_CURRENT_KEY"
{
"new_key": "ack_live_d9e8f7a6b5c4d3e2f1a0b9c8d7e6f5a4b3c2d1e0f9a8b7c6d5e4f3a2b1c0d9e8",
"message": "Your old key is now invalid. Update your integration immediately."
}
Rotation Checklist
After rotating your key, update it in:
Error Responses
| Status | Error | Meaning |
|---|
401 | Missing X-Citadel-Key header | No key provided |
401 | Invalid or inactive API key | Key doesn’t exist or was already deactivated |
503 | Multi-tenancy not configured | Contact support |