System API Keys
System keys authenticate actions on behalf of the entire system rather than a specific user. These keys:- Can only be created by administrators
- Are not tied to the admin who created them
- Persist even if the creating admin is deleted
- Are recommended for automated/programmatic interactions with Phoenix that don’t involve user actions (such as querying REST APIs)
User API Keys
User API keys authenticate actions on behalf of specific users. These keys:- Are associated with and act on behalf of the user who created them
- Can be viewed and deleted by the user who owns them
- Are automatically deleted if the user account is deleted
- Are ideal for personal use cases (e.g., running experiments in a notebook)
Admin Secret
The Admin Secret is a special authentication token that:- Can be used as an alternative to API keys
- Authenticates as the first system user
-
Must meet these requirements:
- At least 32 characters long
- Includes at least one digit and one lowercase letter
-
Must differ from
PHOENIX_SECRET -
Cannot be set if
PHOENIX_SECRETis not configured
- Provisioning Phoenix via REST APIs
- Deploying Phoenix as a sidecar application
- Programmatically generating authentication to send traces, datasets, etc. without requiring login
PHOENIX_ADMIN_SECRET environment variable.
We recommend removing this value from your deployment once you have created a system key.
Key Expiration
Both System and User API keys support expiration dates. Setting expirations can:- Limit access to specific tasks or timeframes
- Support security through automated key rotation
- Reduce the risk of compromised credentials

