API Keys & Security
Your CLI connects to the platform using API Keys. Keep these secure to prevent unauthorized changes.
Managing API Keys
Location
Found in Project Settings > General.
Usage
Set the key as an environment variable:
export POLIAGE_API_KEY=your-api-keyOr in your .env file:
POLIAGE_API_KEY=your-api-keyCI/CD Secrets
Add to your repository secrets:
Rotating Keys
If a key is compromised:
- Go to Project Settings > General
- Click Rotate Key
- Confirm the rotation
- Update your CI/CD secrets
Rotating a key invalidates the old one immediately. Update all environments using this key before rotating.
GitHub App Permissions
The Poliage GitHub App requests:
What We Don't Access
- ❌ Source code files
- ❌ Repository contents
- ❌ Issues or comments
- ❌ Actions or workflows
We only process the visual assets you explicitly publish.
Security Best Practices
- Never commit API keys to version control
- Use environment variables or secret managers
- Rotate keys periodically (every 90 days recommended)
- Limit key access to only necessary team members
- Monitor usage in the dashboard activity log
Enterprise Security
For organizations with strict requirements:
- SAML 2.0 SSO for centralized authentication
- BYOS for data residency compliance
- Audit logs for all API activity
- IP allowlisting (coming soon)