API Authentication & JWT Tokens
The Firma API uses two authentication methods: API key authentication for server-to-server requests, and JWT tokens for embedding the template and signing request editors in your application.
API Key Authentication
All API endpoints require authentication using an API key in the Authorization header.
How it Works
Your API key authenticates your requests and determines which workspace resources you can access. Each workspace has its own unique API key that you can retrieve via the Get Workspace endpoint.
Protected Workspace : Every company account has one protected workspace that cannot be deleted. This protected workspace holds the main API key for your account, which has access to all workspace, API key, company/account, and webhook endpoints. Use this key for account-wide operations or when you need to manage multiple workspaces.
API Key Rotation
You can regenerate API keys for non-protected workspaces to enhance security. When you regenerate a key:
A new API key is created immediately and returned in the response
Old keys are set to expire in 24 hours - they continue working during this grace period
You can manually expire old keys early once you’ve verified the new key works
Protected workspace keys cannot be regenerated via the API. This prevents accidental lockouts from your account. Contact support if you need to rotate your protected workspace key.
Regenerate API Key
Generate a new API key for a workspace. The old key will automatically expire after 24 hours:
const response = await fetch (
`https://api.firma.dev/functions/v1/signing-request-api/workspaces/ ${ workspaceId } /api-key/regenerate` ,
{
method: 'POST' ,
headers: {
'Authorization' : process . env . FIRMA_API_KEY ,
'Content-Type' : 'application/json'
}
}
);
const result = await response . json ();
console . log ( 'New API key:' , result . new_key );
// Store the new key securely
Response:
{
"message" : "API key regenerated. Old keys will expire in 24 hours." ,
"workspace_id" : "123e4567-e89b-12d3-a456-426614174000" ,
"new_key" : "firma_api_abc123xyz..." ,
"expiring_keys" : [
{
"id" : "old-key-uuid" ,
"expires_at" : "2025-12-19T10:30:00Z"
}
]
}
Expire Old Keys Early
After verifying your new key works, you can immediately expire all pending keys:
const response = await fetch (
`https://api.firma.dev/functions/v1/signing-request-api/workspaces/ ${ workspaceId } /api-key/expire` ,
{
method: 'POST' ,
headers: {
'Authorization' : process . env . FIRMA_API_KEY ,
'Content-Type' : 'application/json'
}
}
);
const result = await response . json ();
console . log ( `Expired ${ result . expired_count } key(s)` );
Response:
{
"message" : "Expired 1 pending API key(s)" ,
"workspace_id" : "123e4567-e89b-12d3-a456-426614174000" ,
"expired_count" : 1 ,
"expired_keys" : [ "old-key-uuid" ]
}
Best Practice for Key Rotation:
Call the regenerate endpoint to get a new key
Update your application configuration with the new key
Test that the new key works correctly
Call the expire endpoint to immediately invalidate old keys
Monitor for any errors indicating services still using the old key
Never expose your API key in frontend code or client-side applications. API keys should only be used in secure backend services. Always store them as environment variables.
The API key can be sent in two ways:
Direct format (recommended for simplicity):
Authorization: your-api-key-here
Bearer token format (optional):
Authorization: Bearer your-api-key-here
Both formats are accepted. The Bearer prefix is optional but not required.
Code Examples
curl https://api.firma.dev/functions/v1/signing-request-api/templates \
-H "Authorization: YOUR_API_KEY" \
-H "Content-Type: application/json"
Error Response
If your API key is missing or invalid, you’ll receive a 401 Unauthorized response:
{
"error" : "Unauthorized" ,
"code" : "UNAUTHORIZED" ,
"message" : "Invalid or missing API key"
}
JWT Tokens for Embedded Features
JWT (JSON Web Token) tokens enable you to embed Firma’s template editor and signing request editor directly in your application. These tokens are RSA-256 signed and time-limited for security.
When to Use JWT Tokens
Use JWT tokens when you want to:
Embed the template editor in your application for users to create/edit document templates
Embed the signing request editor for users to customize documents before sending
Provide secure, time-limited access to specific templates or signing requests
Control which resources users can access without exposing your API key
JWT tokens should always be generated from your secure backend , never from frontend code. Your backend uses the API key to generate tokens, which are then passed to the frontend for editor initialization.
JWT Token Types
Token Type Endpoint Expiration Use Case Template Token Generate JWT Token for Embedding Templates 24 hours Embed template editor for creating/editing templates Signing Request Token Generate JWT Token for Signing Request 24 hours Embed signing request editor for document customization
Authentication Flow
Here’s how JWT authentication works for embedded features:
Implementation Guide
Step 1: Generate JWT Token (Backend)
Generate a JWT token from your secure backend using your API key:
Node.js/Express
Python/Flask
// Backend endpoint to generate JWT for template editing
app . post ( '/api/get-template-token' , async ( req , res ) => {
const { templateId } = req . body ;
try {
const response = await fetch (
'https://api.firma.dev/functions/v1/signing-request-api/generate-template-token' ,
{
method: 'POST' ,
headers: {
'Authorization' : process . env . FIRMA_API_KEY ,
'Content-Type' : 'application/json'
},
body: JSON . stringify ({
companies_workspaces_templates_id: templateId
})
}
);
const data = await response . json ();
// Return JWT to frontend (never expose API key)
res . json ({
token: data . jwt ,
expiresAt: data . expires_at
});
} catch ( error ) {
res . status ( 500 ). json ({ error: 'Failed to generate token' });
}
});
Response:
{
"jwt" : "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9..." ,
"jwt_id" : "a1b2c3d4-e5f6-7g8h-9i0j-k1l2m3n4o5p6" ,
"expires_at" : "2025-12-18T10:00:00Z" ,
"template_id" : "template-uuid-here"
}
Step 2: Initialize Editor (Frontend)
Use the JWT token to initialize the embedded editor in your frontend:
<! DOCTYPE html >
< html >
< head >
< title > Template Editor </ title >
<!-- Load the Firma Template Editor library -->
< script src = "https://api.firma.dev/functions/v1/embed-proxy/template-editor.js" ></ script >
</ head >
< body >
< div id = "firma-editor-container" style = "width: 100%; height: 600px;" ></ div >
< script >
async function initializeEditor ( templateId ) {
// Request JWT from your backend
const response = await fetch ( '/api/get-template-token' , {
method: 'POST' ,
headers: { 'Content-Type' : 'application/json' },
body: JSON . stringify ({ templateId })
});
const { token , expiresAt } = await response . json ();
// Initialize the embedded editor
window . FirmaTemplateEditor . init ({
container: '#firma-editor-container' ,
jwt: token ,
templateId: templateId ,
theme: 'light' , // or 'dark'
readOnly: false ,
onSave : ( savedData ) => {
console . log ( 'Template saved successfully:' , savedData );
},
onError : ( error ) => {
console . error ( 'Editor error:' , error );
},
onLoad : ( template ) => {
console . log ( 'Template loaded:' , template );
}
});
}
// Initialize with your template ID
initializeEditor ( 'your-template-id-here' );
</ script >
</ body >
</ html >
For signing request editor, use the signing request JWT endpoint and the signing request editor library:
// Generate signing request token from backend
const response = await fetch ( '/api/get-signing-request-token' , {
method: 'POST' ,
headers: { 'Content-Type' : 'application/json' },
body: JSON . stringify ({ signingRequestId })
});
const { token } = await response . json ();
// Load signing request editor library
// <script src="https://api.firma.dev/functions/v1/embed-proxy/signing-request-editor.js"></script>
// Initialize signing request editor
window . FirmaSigningRequestEditor . init ({
container: '#firma-signing-request-container' ,
jwt: token ,
signingRequestId: signingRequestId ,
theme: 'light' ,
onSave : ( data ) => console . log ( 'Signing request saved:' , data ),
onSend : ( data ) => console . log ( 'Signing request sent:' , data ),
onError : ( error ) => console . error ( 'Error:' , error )
});
Step 3: Revoke JWT Token (Optional)
Revoke a JWT token when it’s no longer needed:
const response = await fetch (
'https://api.firma.dev/functions/v1/signing-request-api/revoke-template-token' ,
{
method: 'POST' ,
headers: {
'Authorization' : process . env . FIRMA_API_KEY ,
'Content-Type' : 'application/json'
},
body: JSON . stringify ({
jwt_id: 'a1b2c3d4-e5f6-7g8h-9i0j-k1l2m3n4o5p6'
})
}
);
const result = await response . json ();
// { message: "JWT revoked successfully", jwt_id: "...", revoked_at: "..." }
JWT Security Best Practices
Security Checklist:
✅ Always generate JWTs from your backend - Never expose your API key in frontend code
✅ Use environment variables - Store API keys securely, never hardcode them
✅ Validate token expiration - Check expires_at and refresh tokens as needed
✅ Use HTTPS only - Never transmit tokens over unencrypted connections
✅ Revoke unused tokens - Revoke JWTs when editing is complete or the session ends
✅ Implement token refresh - Request new tokens before expiration for ongoing sessions
✅ Scope tokens appropriately - Each JWT is tied to a specific template or signing request
Learn more about implementing embedded features and working with the API:
API Reference
Key authentication and JWT management endpoints:
API Key Management:
JWT Token Management:
Getting Started: