How Argide authenticates when calling your API.Documentation Index
Fetch the complete documentation index at: https://docs.argide.ai/llms.txt
Use this file to discover all available pages before exploring further.
Auth Types
| Type | Use Case | Header Sent |
|---|---|---|
| API Key | Static server-to-server auth | X-API-Key: your-key |
| Bearer Token | OAuth/static token | Authorization: Bearer token |
| JWT Forward | Per-user actions | Authorization: Bearer <user-jwt> |
API Key
Your agent sends a static key in a custom header. OpenAPI spec:- Select API Key
- Enter header name (
X-API-Key) - Enter your key
Bearer Token
Your agent sends a static token in the Authorization header. OpenAPI spec:- Select Bearer Token
- Enter your token
JWT Forward
Your agent forwards the user’s Argide identity token to your API. This enables user-specific actions like “check my orders” or “cancel my subscription.”This is not your app’s session JWT. It’s an Argide-scoped identity token your backend mints with
ARGIDE_VERIFICATION_SECRET. See Identity Verification.How it works
- Your backend mints an Argide identity token (JWT signed with Argide secret)
- Frontend passes it to widget:
window.argide('identify', { token }) - When calling your API, Argide forwards that same token
- Your API verifies it (same secret) and identifies the user
- Select JWT Forward
- No additional config — token comes from widget user
Your API must verify the token
Which to Use?
| Scenario | Auth Type |
|---|---|
| All requests use same credentials | API Key or Bearer |
| User-specific actions (my orders, my account) | JWT Forward |
| Public API, no auth needed | None |
Troubleshooting
| Issue | Solution |
|---|---|
| 401 errors | Check secret matches, verify token not expired |
| Tools not showing for users | JWT Forward requires authenticated users |
Double path prefix (/api/api/) | Put prefix in Base URL OR paths, not both |
