All requests to the Kaiko API must be authenticated with an API key. This page explains how authentication works, how to keep your keys secure, and related security practices.
Add your API key to the x-api-key header for every request:
x-api-key: YOUR_API_KEYExample with curl:
curl https://api.kaiko.ai/v1/emotions/analyse \
-H "x-api-key: $KAIKO_API_KEY" \
-H "Content-Type: application/json" \
-d '{"model":"emotion-v1","messages":[{"content":{"text":"hello"}}]}'For POST requests that might be retried (e.g., after a timeout), supply an Idempotency-Key header:
Idempotency-Key: 7f65ab21d1-test-123Context-Based Emotion API:
Emotional states tied to a context_id are stored temporarily for session continuity.
Non-Context API:
No state is stored; analysis is ephemeral.
Chat API:
Messages may be stored transiently for processing but are not persisted beyond request lifetime.
Opt-out flags:
Future releases will support client-side flags to disable temporary logging.
https://).Kaiko APIs are designed for enterprise use and comply with industry-standard data handling practices.
PII: Kaiko does not require personal identifiers in text input. Developers are responsible for avoiding unnecessary PII.
Export controls: Certain features may be subject to regulatory restrictions.
1. Store Kaiko API keys in a secrets manager (AWS Secrets Manager, GCP Secret Manager, Vault).
2. Application backend fetches keys securely at runtime.
3. Clients (mobile/web) never see raw Kaiko keys — they call your backend.
4. Backend adds x-api-key when forwarding requests to Kaiko.
5. Use Idempotency-Key for retries and log all request_id values.Next: see Rate Limits & Error Handling to learn how to handle errors gracefully, or Models to explore available models.