Skip to content

Auth API Key

WebbinRoot edited this page Mar 9, 2026 · 1 revision

Auth: API Key

Table of Contents

Overview

API keys are long-lived credentials for OCI users.

  • If you come from AWS, think of this like an IAM user access key workflow.
  • If you come from GCP, think of this like a service-account key workflow.

In OCI, API keys are a public/private key pair. The private key is stored on your local filesystem, and OCI clients use that key to sign outgoing HTTP requests. That is why this profile requires a local private key path plus identity metadata.

This page will:

  • Walk through where the API key credentials come from in OCI.
  • Show how those values map to the OCISigner API Key profile fields.
  • Demonstrate Test Credentials.
  • Demonstrate signing a normal request.

Setup and Retrieve Credentials

  1. In OCI Console, go to Identity & Security and open your identity domain. Identity domains in OCI contain users, groups, and dynamic group principals.

Identity and Security landing

Figure 1. Identity domain list in specific compartment.

  1. Navigate to "User management" and open the user you want to generate an API key for.

Identity domain list

Figure 2. User management in identity domain.

Domain users list

Figure 3. List of users in identity domain.

Selected user details

Figure 4. Specific user details and API Keys tab.

  1. Generate or upload an API public key for that user.

Add API key action

Figure 5. "Add API key" option.

Generated key preview

Figure 6. Download generated API key pair.

  1. From the config preview, collect:
    • tenancy (Tenancy OCID)
    • user (User OCID)
    • fingerprint
    • key_file (private key path)

Config preview values

Figure 7. OCI config preview showing required fields.

  1. On local systems, this is commonly represented in ~/.oci/config plus a private key file.
cat /home/kali/Downloads/private_key
-----BEGIN PRIVATE KEY-----
MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQCwm1euHrT70xz0
[REDACTED]
-----END PRIVATE KEY-----

cat ~/.oci/config
[DEFAULT]
user=ocid1.user.oc1..aaaaa[REDACTED]
fingerprint=c6:da:[REDACTED]
tenancy=ocid1.tenancy.oc1..aaaa[REDACTED]
region=us-phoenix-1
key_file=/home/kali/Downloads/private_key

Plug Into OCISigner

  1. In OCISigner, create/select a profile and choose Auth Type = API Key.
  2. Copy values from your OCI config preview (or ~/.oci/config) into the profile.
  3. Click Save.

Field Reference

Field Required Source
Region Recommended region (required for namespace probe via Test Credentials)
Tenancy OCID Yes tenancy
User OCID Yes user
Fingerprint Yes fingerprint
Private Key File Yes key_file or local private key path
Key Passphrase Optional only if private key is encrypted

API key profile populated

Figure 8. API Key profile populated in OCISigner.

Run Test Credentials

  1. Click Test Credentials in the profile.
  2. OCISigner sends a signed probe request to the namespace endpoint and logs the result.
  3. Review status and see details in Logger.

Test credentials button and status

Figure 9. Test Credentials action in the profile UI.

Logger request entry

Figure 10. Test Credentials result summary.

Logger signed request details

Figure 11. Logger entry for signed credential test request.

Sign a Request

  1. Confirm signing is enabled and the active profile is set correctly.

Signing settings enabled

Figure 12. Signing settings enabled before sending traffic.

  1. Send a request from Repeater or via Proxy.
  2. Confirm headers are updated and signature is added.

Request sent from Repeater

Figure 13. Request sent from Repeater for signing.

Signed request in Logger

Figure 14. Signed request recorded in Logger.

Notes

  • If you already keep OCI credentials in ~/.oci/config, consider Auth: Config Profile.
  • You can also import profiles through Import -> Auto instead of manually copying fields. Review Feature Notes
  • Never share private keys or raw tokens in screenshots or logs.

Clone this wiki locally