Documentation Index
Fetch the complete documentation index at: https://docs.wazzapi.com/llms.txt
Use this file to discover all available pages before exploring further.
Authentication
WazzAPI supports two main authentication paths depending on how you use the platform.Dashboard authentication
The dashboard sign-in flow is designed for people using the product directly.- sign-in is currently Google-only
- authenticated users operate through sessions and cookies
- access is controlled by your organization membership and role
API Key Authentication
API keys are the standard authentication method for server-to-server integrations with the WazzAPI API.This is the recommended method for backend services, automations, and webhook consumers.
How It Works
Include your API key in theAuthorization header of every request:
Authentication Header
Example Request
cURL
Managing Keys
You can create and manage API keys from the Developers area in the dashboard.- Keys belong to your organization.
- Keys can include scopes and expiry settings.
- Keys respect your available permissions and plan limits.
- You can revoke or rotate keys at any time.
MCP authentication
WazzAPI MCP uses the same WazzAPI account access model, but the hosted MCP server authenticates with a custom header instead of the REST API Bearer format.See the dedicated WazzAPI MCP guide for the hosted MCP URL, Claude Code setup command, workspace path constraints, and agent mode.
Troubleshooting
Common authentication errors:| Error Code | Meaning | Solution |
|---|---|---|
401 Unauthorized | Invalid or missing key | Check your Authorization header format. |
403 Forbidden | Insufficient permissions | Verify the key belongs to the correct organization and includes the required scope. |
429 Too Many Requests | Plan or rate limit reached | Check billing or rate-limit guidance before retrying. |
Recommended rule of thumb
- Humans → sign in through the dashboard
- Backends and automations → call the API with Bearer API keys