# API Key Overview
# Preamble
There are multiple ways to use the API key. Each of them has its own benefits and drawbacks. Use the list below to choose the best option for you.
# Overview
In general there are three ways to use the API Key:
a) Session Based
b) Sessionless With Local Decryption
c) Sessionless With Remote Decryption
# Comparison
Session Based | Sessionless With Local Decryption | Sessionless With Remote Decryption | |
---|---|---|---|
Usecase | Build pipelines / Console client as alternative to web based clients. | Implementation in code to dynamically load specific secrets | Buildpipelines as proof of concept when the psonoci for some reason is no option |
Permission | Read & Write of Datastores, Secrets, ... | Read of specific Secrets | Read of specific Secrets |
Implementation Effort | medium (with the official client) | high | low |
Simple client support (e.g. curl) | No | No | Yes |
Server gets temporary access to decrypted data | No | No | Yes |
Necessity to decrypt data locally | Yes | Yes | No |
Data Encryption | Yes | Yes | No |
Additional Transport Encryption | Yes | No | No |
WARNING
We highly discourage the usage of the sessionless usage with remote decryption.