Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.useglyde.co/llms.txt

Use this file to discover all available pages before exploring further.

All Glyde API requests must be authenticated using Bearer tokens. This ensures that only authorized applications can access your account and perform transactions.

API Keys

Glyde provides different types of API keys for different purposes:
Key TypePrefixPurpose
Live Secret Keysk_Production transactions with real money
Sandbox Secret Keysk_Testing without processing real transactions
Public Keypk_Client-side operations with limited access
Secret keys grant full access to your account. Never expose them in client-side code, commit them to version control, or share them publicly. Store them securely as environment variables.

Getting Your Keys

  1. Log in to your dashboard at app.useglyde.co
  2. Navigate to SettingsAPI Configuration
  3. Copy your keys for the appropriate environment
Your dashboard displays both sandbox and live keys. Use sandbox keys during development and switch to live keys only when you’re ready for production.

Making Authenticated Requests

Include your secret key in the Authorization header of every API request:
Authorization: Bearer sk_your_secret_key
curl -X GET "https://api.useglyde.co/v1/banks" \
  -H "Authorization: Bearer sk_your_secret_key"

Authentication Errors

If authentication fails, you’ll receive a 401 Unauthorized response:
{
  "status": "failed",
  "message": "Unauthenticated"
}
Common causes:
  • Missing Authorization header
  • Invalid or expired API key
  • Using a sandbox key against the production URL (or vice versa)
  • Malformed header (e.g., missing “Bearer” prefix)

Environments

Each environment has its own base URL and requires matching API keys:
ModeBase URLKey Prefix
Sandboxhttps://sandbox.useglyde.co/v1sk_
Productionhttps://api.useglyde.co/v1sk_
Requests to production with sandbox keys (or vice versa) will fail authentication.

Security Best Practices

  1. Use environment variables — Store keys in environment variables, not in code
  2. Rotate keys periodically — Regenerate keys if you suspect they’ve been compromised
  3. Separate environments — Use different keys for development, staging, and production
  4. Server-side only — Make API calls from your backend, never from browsers or mobile apps
  5. Monitor usage — Review your API logs in the dashboard for unusual activity