PartnerOS uses session-based authentication. When you sign in through the web application, the server issues a session cookie that is tied to your user account and active organization. Every subsequent request to the API must carry that cookie so the server can verify your identity and scope your data to the correct organization.Documentation Index
Fetch the complete documentation index at: https://docs.partneros.ai/llms.txt
Use this file to discover all available pages before exploring further.
How authentication works
There is no separate API key system. Authentication flows through the same mechanism the PartnerOS web app uses:- You sign in at
https://app.partneros.comwith your email and password (or SSO). - The server sets a session cookie in your browser.
- You include that cookie in
Cookierequest headers when calling API endpoints directly.
Obtaining a session
Sign in via the auth endpoint to establish a session programmatically:Set-Cookie header. Capture the cookie value from that header and include it in subsequent requests.
Making an authenticated request
Pass the session cookie in theCookie header on every API call:
The session cookie name is
session_token. Copy the value from the Set-Cookie header returned at sign-in and pass it in every subsequent request.Session expiry
Sessions expire after a period of inactivity or when you sign out. When a session expires, the API returns401 Unauthorized. Sign in again to obtain a fresh session.
Common authentication errors
401 Unauthorized
Your request is missing a session cookie, or the session has expired.403 Forbidden
You are authenticated but your account role does not permit the requested action. For example, users with thepartner role cannot access internal management endpoints.
400 No active organization
Your session is valid but no active organization is set.Security recommendations
- Rotate your session by signing out and signing back in if you suspect a token has been compromised.
- Use environment variables or a secrets manager to store session tokens in scripts or CI pipelines.
- Prefer short-lived sessions for automated workflows and re-authenticate on a schedule rather than reusing a single long-lived token.