Authentication
Lucitra Validate uses API keys for programmatic access and Stytch B2B session tokens for dashboard users. This page covers how authentication works, rate limits, enterprise tier gating, and debugging tools.API Keys
API keys are the primary authentication method for the REST API, CLI, and MCP server. Generate keys from your dashboard at validate.lucitra.ai under Settings > API Keys. All API keys use theluci_ prefix and are passed as Bearer tokens in the Authorization header:
Key Management
- Keys can be created and revoked from the dashboard at any time
- Each key is scoped to a single organization
- Revoking a key takes effect immediately — all in-flight requests using that key will be rejected
- There is no way to retrieve a key after creation; store it securely when generated
Rate Limiting
All API keys are subject to rate limits to ensure platform stability.| Parameter | Value |
|---|---|
| Window | 60-second sliding window |
| Limit | 100 requests per window |
| Scope | Per API key |
429 Too Many Requests response:
| Header | Description |
|---|---|
X-RateLimit-Limit | Maximum requests allowed in the window |
X-RateLimit-Remaining | Requests remaining in the current window |
X-RateLimit-Reset | Unix timestamp when the window resets |
JWT Sessions (Dashboard)
The Lucitra Validate dashboard uses Stytch B2B session tokens for user authentication. These are managed automatically by the web application and are not required for API-only usage.If you are only using the REST API, CLI, or MCP server, you do not need to interact with JWT sessions. API keys are sufficient for all programmatic access.
Enterprise Tier Gating
Certain endpoints are restricted to organizations on the Enterprise tier. Attempting to access these endpoints on a free or standard plan returns a403 Forbidden response with the ENTERPRISE_REQUIRED error code.
Gated capabilities include:
| Capability | Endpoints |
|---|---|
| Compliance engine | /v1/compliance/* |
| Audit trail | /v1/audit/* |
| Provenance tracking | /v1/provenance/* |
| Model cards | /v1/model-cards/* |
| Certification reports | /v1/certifications/* |
Contact sales@lucitra.ai or visit your billing settings to upgrade to Enterprise.
Request IDs
Every API response includes anX-Request-Id header containing a unique identifier for that request. Include this ID when contacting support or filing bug reports.
Extracting the Request ID
Security Best Practices
Rotate Keys Regularly
Generate new API keys periodically and revoke old ones. This limits the blast radius if a key is compromised.
Use Environment Variables
Store keys in environment variables or a secrets manager. Never hardcode keys in source files.
Monitor Usage
Review API usage in the dashboard to detect unexpected spikes that may indicate a leaked key.
Scope Access
Use separate API keys for different environments (development, staging, production) and services.