API credentials (a Client ID and Client Secret) allow external systems to authenticate with the tieback platform programmatically. This guide covers how to create, rotate, revoke, and use them.
products:read).After creation, your Client Secret is displayed exactly once in a secure modal:
.env or JSON for safe storage.If you lose the secret, you must rotate the credential to generate a new one. There is no way to recover the original secret.
The one-time secret modal provides:
You can change or remove the expiry date for an active credential, subject to a 72-hour lock window:
To edit expiry:
Expiry is stored in UTC. The lock window is computed server-side — if your browser clock is slightly ahead, the server may still reject the edit. If this happens, the page will automatically refresh to show the current state.
Rotation replaces the secret without changing the Client ID:
Rotation does not extend the expiry date. If the credential is close to expiry, edit the expiry first (if outside the lock window) or create a new credential.
Expired credentials cannot be rotated. If a credential has expired, you must create a new one.
There is no auto-rotation in Phase 3. All rotations are manual. If you lose the new secret, you must rotate again.
Revocation is permanent and cannot be undone.
You may revoke a credential even if it has expired. Revocation creates an explicit administrative audit record, distinct from time-based expiry. The UI will display “Revoked” even if the expiry date is in the past.
revoked and can no longer authenticate.Expiry and revocation are distinct lifecycle events. A credential can expire (time-based) without being revoked. Revoking an expired credential formally records administrative intent in the audit trail.
Expired credentials cannot be rotated. If a credential has expired and you still need access, create a new credential. You may optionally revoke the expired credential for a clean audit trail.
If you need access again, create a new credential.
Use supabase.functions.invoke to call tieback API endpoints. The SDK automatically attaches the required headers.
Do not use raw fetch — the gateway requires both Authorization and apikey headers, which
the SDK attaches automatically.
Your Brand ID is shown on the Settings → Brand Settings page as a read-only field. Click the copy icon to copy it to your clipboard.
.env to your .gitignore.Can I see the secret after closing the modal? No. The secret is shown only once. If lost, rotate to generate a new one.
Can I reactivate a revoked credential? No. Revocation is permanent. Create a new credential instead.
What happens when a credential expires? Expired credentials are treated as inactive and can no longer authenticate. Create a new one or remove the expiry before it lapses.