Authentication
Authentication in Compozy is required to access cloud services, publish components to the registry, and manage your workflows in production. This guide covers how to authenticate with Compozy Cloud and manage your credentials securely.
Quick Reference
Here’s a quick overview of all available authentication commands:
Command | Description |
---|---|
compozy login | Log in to Compozy Cloud |
compozy logout | Log out and remove stored credentials |
compozy auth status | Check authentication status |
compozy auth list | List all active sessions |
compozy auth refresh | Manually refresh authentication token |
compozy auth revoke <token_id> | Revoke a specific token |
compozy auth revoke-all | Revoke all active tokens |
Authentication Methods
CLI Login
Authenticate using the Compozy CLI for local development and deployments.
API Keys
Use API keys for programmatic access and CI/CD integrations.
CLI Authentication
Login Command
Use the following command to authenticate with Compozy Cloud:
This will open your default browser to complete the authentication process.
Verify Authentication
Confirm your authentication status:
Logout
To logout and remove stored credentials:
API Keys
API keys provide secure, programmatic access to Compozy services. They are especially useful for CI/CD pipelines and automated deployments.
Generate API Key
- Visit the Compozy Cloud Dashboard
- Navigate to Settings > API Keys
- Click “Generate New Key”
- Save the key securely - it won’t be shown again
Configure API Key
Set your API key using one of these methods:
Key Management
Best practices for API key security:
- Rotate keys regularly
- Use different keys for different environments
- Never commit keys to version control
- Set appropriate key permissions and expiration
CI/CD Integration
For secure authentication in CI/CD pipelines:
Token Management
View Active Sessions
List all active authentication sessions:
Revoke Access
Revoke specific tokens or all active sessions:
Token Refresh
Tokens are automatically refreshed when needed. Manual refresh:
Security Best Practices
Credential Storage
- Use environment variables for API keys
- Leverage secure credential managers
- Never hardcode credentials in code
Access Control
- Follow the principle of least privilege
- Regularly audit access permissions
- Remove unused credentials promptly
Environment Separation
- Use different credentials per environment
- Implement proper key rotation policies
- Monitor credential usage patterns
Troubleshooting
Need Help?
- Run
compozy auth --help
for detailed command information - Visit our Discord community for support
- Check our troubleshooting guide
- Contact Compozy Support for assistance