Upcoming Mid April 2026
The Agent Builder API uses different authentication headers depending on the service you’re calling.
Outer Bridge (Main API)
| Header | Description |
|---|---|
auth-token | JWT from login |
account-id | Current account ID |
organization-id | Current organization ID |
x-aui-client | Always "AUI" |
x-aui-environment | "staging" or "production" |
x-aui-origin | Always "stores" |
Best Practices
- Store JWTs securely — Use environment variables or a secrets manager. Never hardcode tokens in source code.
- Refresh before expiry — JWTs have a limited lifetime. Use the
refreshTokenfrom the login response to obtain a new token before the current one expires. - Always set
x-aui-environment— Explicitly passstagingorproductionto avoid accidental cross-environment requests. Default tostagingduring development. - Validate
account-idandorganization-id— Mismatched IDs will return authorization errors. Confirm the correct pair with aGET /network/v1/accountcall before making other requests.
Agent Settings V2
| Header | Description |
|---|---|
Authorization | Bearer <JWT> (primary) |
x-api-key | Fallback API key (when Bearer fails) |
X-Organization-ID | Organization ID |
x-aui-client | Always "AUI" |
x-aui-environment | "staging" or "production" |
x-trace-id | Random UUID per request |
Best Practices
- Generate a unique
x-trace-idper request — Use UUID v4. This enables end-to-end tracing and makes debugging significantly easier when working with support. - Prefer Bearer over
x-api-key— Thex-api-keyfallback is intended for service-to-service calls where JWT refresh is impractical. For interactive use, always useAuthorization: Bearer. - Include
x-api-keyas a fallback — If your integration runs long-lived background jobs, include both headers. The API will try Bearer first and fall back to the API key if the JWT has expired.
Knowledge Base Manager
| Header | Description |
|---|---|
x-api-key | KBM-specific API key |
Best Practices
- Use a dedicated KBM key — The KBM API key is separate from the Outer Bridge JWT. Do not reuse the same credentials across services.
- Scope keys per environment — Use different KBM keys for staging and production to prevent accidental data contamination.
- Rotate keys periodically — Treat the KBM key like any other secret. Rotate it on a regular cadence and immediately if compromised.
