KeyStone OS uses Auth0 for authentication. There are two authentication methods depending on your use case.Documentation Index
Fetch the complete documentation index at: https://docs.keystoneos.xyz/llms.txt
Use this file to discover all available pages before exploring further.
M2M tokens (platform integration)
M2M (Machine-to-Machine) tokens are for server-to-server communication where no human user is involved. Your backend exchanges itsclient_id and client_secret for a short-lived access token via the Auth0 Client Credentials flow. This is the primary authentication method for platforms calling the KeyStone API.
| Scope | Description |
|---|---|
settlements:read | View settlements and events |
settlements:write | Create settlements, submit compliance decisions |
templates:read | View settlement templates |
platform:read | View platform details |
platform:webhooks:manage | Manage webhook endpoints |
User tokens (dashboard access)
For interactive KeyStone Dashboard access, users authenticate via Auth0 Organizations using PKCE flow. User tokens carrypermissions instead of scope.
Team members can be invited and managed in the dashboard under Members. Each member is assigned a role that controls which dashboard features they can access.
Environment header: User tokens must include the X-Keystone-Environment header to specify which environment to operate in:
IP allowlisting
Environments can optionally restrict API access to specific IP addresses. When configured, only requests from allowlisted IPs are accepted for M2M tokens in that environment. Configure IP allowlists in the KeyStone Dashboard under Settings > Security. You can add individual IPs or CIDR ranges, each with an optional description.When no IPs are configured, all addresses are permitted. Adding the first IP immediately restricts access to only allowlisted addresses.
Token lifecycle
| Property | Value |
|---|---|
| Token type | JWT (RS256) |
| Expiry | 24 hours |
| Refresh | Request a new token before expiry |
| Rate limits | Contact support for current limits |
Example: authenticated request
Next: Your first settlement
Walk through a complete settlement end-to-end.