M2M tokens (platform integration)
For server-to-server integration, use Auth0 Client Credentials (M2M) tokens. This is the primary authentication method for platforms calling the KeyStone API.| Scope | Description |
|---|---|
settlements:read | View settlements and events |
settlements:write | Create settlements, submit compliance decisions |
templates:read | View settlement templates |
templates:write | Create and update templates |
platform:read | View platform details |
platform:webhooks:manage | Manage webhook endpoints |
User tokens (dashboard access)
For interactive KeyStone Dashboard access, users authenticate via Auth0 Organizations using PKCE flow. User tokens carrypermissions instead of scope.
Team members can be invited and managed in the dashboard under Members. Each member is assigned a role that controls which dashboard features they can access.
Environment header: User tokens must include the X-Keystone-Environment header to specify which environment to operate in:
IP allowlisting
Environments can optionally restrict API access to specific IP addresses. When configured, only requests from allowlisted IPs are accepted for M2M tokens in that environment. Configure IP allowlists in the KeyStone Dashboard under Settings > Security. You can add individual IPs or CIDR ranges, each with an optional description.When no IPs are configured, all addresses are permitted. Adding the first IP immediately restricts access to only allowlisted addresses.
Token lifecycle
| Property | Value |
|---|---|
| Token type | JWT (RS256) |
| Expiry | 24 hours |
| Refresh | Request a new token before expiry |
| Rate limits | Contact support for current limits |
Example: authenticated request
Next: Your first settlement
Walk through a complete settlement end-to-end.