Authentication
You'll need to authenticate your requests to access any of the endpoints in the ibakepro API. In this guide, we'll explain how authentication works using API keys.
API Key Authentication
The ibakepro API uses API keys for authentication. Each API key is scoped to specific permissions and tied to a single tenant (bakery business).
Obtaining an API key
- Log in to your ibakepro dashboard
- Navigate to Business > Developers > API Keys
- Click Generate New Key
- Give your key a descriptive name (e.g., "POS Integration", "Website Orders")
- Select the required scopes for your integration
- Click Create and copy your API key
Your API key will only be displayed once. Store it securely - if you lose it, you'll need to generate a new key.
Regional API Endpoints
ibakepro uses regional API endpoints to ensure your data stays in the correct region. Use the endpoint that matches your account's region:
- Name
api.ibakepro.com- Type
- North America
- Description
USA and Canada region endpoint.
- Name
au.api.ibakepro.com- Type
- Australia
- Description
Australia region endpoint.
- Name
eu.api.ibakepro.com- Type
- Europe
- Description
Europe region endpoint.
You must use the endpoint that matches your account's region. Requests to the wrong region will return an error.
Using your API key
Include your API key in the Authorization header as a Bearer token:
Example request with API key
curl https://api.ibakepro.com/api/v1/orders \
-H "Authorization: Bearer ibp_live_us_abc123..."
API Key Scopes
API keys can be created with specific scopes to limit access. Available scopes:
- Name
orders:read- Description
Read access to orders
- Name
orders:write- Description
Create and update orders
- Name
customers:read- Description
Read access to customers
- Name
customers:write- Description
Create and update customers
- Name
expenses:read- Description
Read access to expenses
- Name
expenses:write- Description
Create and update expenses
- Name
pantry:read- Description
Read access to pantry items
- Name
pantry:write- Description
Create and update pantry items
Security best practices
Never expose your API keys in client-side code, public repositories, or logs. Always use environment variables to store keys securely.
- Rotate keys regularly - Generate new keys periodically and revoke old ones
- Use minimal scopes - Only request the scopes your integration needs
- Revoke compromised keys - If a key is exposed, revoke it immediately
Rate limiting
API requests are rate limited to protect the service. Current limits:
- 100 requests per minute per API key
- 1000 requests per hour per API key
If you exceed these limits, you'll receive a 429 Too Many Requests response.
