Skip to content

Authentication

The Meridian Track API uses API keys for authentication. API keys are scoped to a workspace and can be configured with specific permissions and rate limits.

  1. Navigate to API Keys in the sidebar of the Meridian Track app
  2. Click Create API Key
  3. Configure:
    • Name: A descriptive label for the key
    • Scopes: Which resources the key can access (read/write per resource)
    • Rate Limits: Requests per minute and per hour
    • Expiry: Optional expiration date
  4. Click Create

Include the API key in the X-API-Key header of every request:

Terminal window
curl https://api.meridiantrack.com/v1/clients \
-H "X-API-Key: mt_live_your_api_key_here"

API keys follow the format: mt_live_ followed by a random string (~50 characters total).

The mt_live_ prefix makes keys easily identifiable in code and logs.

Scopes control which resources an API key can access. Each resource has read and write scopes:

ScopeAccess
clients:readList and get clients
clients:writeCreate, update, and delete clients
projects:readList and get projects
projects:writeCreate, update, and delete projects
tasks:readList and get tasks
tasks:writeCreate, update, and delete tasks
tags:readList and get tags
tags:writeCreate, update, and delete tags
time-entries:readList and get time entries
time-entries:writeCreate, update, and delete time entries
favorites:readList and get favorites
favorites:writeCreate, update, and delete favorites
invoices:readList and get invoices
invoices:writeDelete invoices

If a request requires a scope the key doesn’t have, the API returns a 403 Forbidden error.

To revoke an API key:

  1. Navigate to API Keys in the app
  2. Click the revoke button on the key you want to disable

Revoked keys immediately stop working. There may be up to a 5-minute delay due to authorizer caching.

  • Use minimal scopes — only grant the permissions your integration needs
  • Set expiration dates — rotate keys regularly
  • Never commit keys — use environment variables or secrets management
  • One key per integration — makes it easy to revoke access for a specific tool
  • Monitor usage — check the “Last Used” timestamp to detect unused keys