Advanced Security
Warpy can protect widget chat calls with short-lived signed widget tokens. This is the flow:- Enable Require signed widget token
- Generate a Widget API Key
- Implement a customer-owned refresh endpoint such as
POST /widget-token - Have that endpoint call Warpy’s
POST /widget-token - Return
{ "token": "<jwt>" } - Deploy the staged changes
What the API key is for
The Widget API Key is a server-side secret. It should never be exposed to the browser. Warpy uses it to mint short-lived widget JWTs for a specific agent.Staged changes
Advanced Security uses a draft-and-deploy flow:- enabling signed tokens is staged
- changing the refresh endpoint path is staged
- generating or rotating the API key is staged
- nothing goes live until you click Deploy Changes
Refresh endpoint requirements
The configured refresh endpoint path must:- start with
/ - be a path, not a full URL
- live on the base URL you selected for that environment
POST /test-widget-token, for non-production
testing when TEST_WIDGET_TOKEN_API_KEY is configured.
Rate limits
User rate limits let you cap actions per user by IP address. You can set:- daily limit
- monthly limit