API key setup and handling
When to use
Use this for account-managed service integrations
Use API keys for first-party or controlled service-to-service workloads where OAuth connector trust flows are not required.
Request example
Validate key with tools/list
POST https://mcp.soundside.ai/mcp
Authorization: Bearer <your_api_key>
Content-Type: application/json
{"jsonrpc":"2.0","id":"1","method":"tools/list","params":{}}Response example
Expected success signal
{
"jsonrpc": "2.0",
"id": "1",
"result": {
"tools": [{ "name": "create_video" }]
}
}Error behaviors
Key lifecycle failures
- •
401Unauthorized: missing, malformed, or revoked key. - •
403Forbidden: key valid but blocked by client trust or tool policy. - •
429Quota exceeded: apply retry windows from rate-limit headers.
Operational notes
Secure usage defaults
- • Generate keys in
/developer/consoleafter sign-up and copy once. - • Store keys in a secret manager; never embed in client-side browser code.
- • Rotate immediately on exposure suspicion and audit automation scopes regularly.
- • Start with minimal tool tiers and expand only after run reliability is proven.