Documentation Index
Fetch the complete documentation index at: https://docs.esperr.com/llms.txt
Use this file to discover all available pages before exploring further.
API Key Authentication
API Key ValidationAll ingest endpoints require valid API keys for authentication:
- Header: API keys must be passed in the
x-esper-api-keyheader - Response: Invalid or missing keys return
401 Unauthorized - Scope: API keys are tenant-scoped
Rate Limiting
API keys are rate limited. Exceeding the limit returns429 Too Many Requests.
Limits are applied independently per API key so one source’s traffic does not
affect another.
Operator authentication
The current dashboard model is bearer-token based. Hosted browser flow:- The operator starts from an auth route such as
/auth/github/login. - The backend issues a JWT after successful callback.
- The frontend stores the token as
esper.auth_token. - API requests send
Authorization: Bearer <token>.
- The server now has dedicated auth middleware.
- Dashboard routes require a bearer JWT before tenant membership checks run.
- Invalid tokens return
401.
Membership management
Memberships are tenant-scoped. The UI supports:- Create or update a membership with
user_idandrole. - Remove a membership by
user_id.
| Role | Current meaning |
|---|---|
Owner | highest tenant role |
Admin | administrative operator |
Analyst | analysis-oriented operator |
Viewer | read-oriented operator |