Authentication
Token exchange, introspection, and identity lookup. For conceptual overview see Authentication.
ScaiVault delegates identity to ScaiKey. Most auth endpoints live on ScaiKey; ScaiVault exposes a thin layer for token introspection and context discovery.
Base path: /v1/auth/
GET /v1/auth/whoami#
Identify the caller from the bearer token. Useful for debugging — shows you who ScaiVault sees you as.
1 2 | |
Response:
1 2 3 4 5 6 7 8 9 10 11 12 | |
Required: authenticated.
POST /v1/auth/introspect#
Validate a token without using it. Common in gateway/proxy scenarios.
1 2 3 4 | |
Response:
1 2 3 4 5 6 7 8 9 | |
If the token is invalid or expired: {"active": false} with HTTP 200.
Required: admin scope.
POST /v1/auth/exchange#
Exchange a foreign token (workload identity from Kubernetes, AWS, GCP, etc.) for a ScaiKey-minted ScaiVault token. Used by services that don't have static credentials.
1 2 3 4 5 6 7 8 9 | |
Response:
1 2 3 4 5 6 | |
Configure the trust relationship (which foreign issuers to accept, how to map to ScaiKey identities) in the admin UI under Access → Token Exchange.
Required: none (the subject token authenticates).
OAuth flows on ScaiKey#
Everything else — authorization code + PKCE, client credentials, refresh token rotation — happens on ScaiKey directly. See scaikey.scailabs.ai/docs. ScaiVault accepts the resulting bearer tokens on every endpoint.