Skip to main content
Scopes are required and validated for private methods. If you only plan to use public methods, you can use the default scope values. πŸ“– Related Support Article: Connection Management

Connection and Session Management

These scopes control how tokens are bound to connections and sessions:
ScopeDescription
connectionAccess is granted for the duration of the connection (or until expiration). When the connection closes, users must repeat authentication to get new tokens. Set automatically by the server when neither connection nor session scope is specified.
session:nameCreates a new session with the specified name, generating tokens bound to the session. Allows reconnection and token reuse within session lifetime. Maximum 16 sessions per user. For WebSocket: enables skipping access_token in subsequent requests.
mainaccountSet automatically by the server when the connecting user’s credentials belong to the main account, otherwise not included in the final scope.

Functional Access Scopes

These scopes define what API functionality your token can access. Each functional area supports both read-only (:read) and read-write (:read_write) access levels.

Account Management

ScopeDescription
account:readRead-only access to account methods and data.
account:read_writeFull access to account methods - manage settings, add subaccounts, etc.

Trading

ScopeDescription
trade:readRead-only access to trading methods and data.
trade:read_writeFull access to trading methods - create and modify orders.

Wallet Operations

ScopeDescription
wallet:readRead-only access to wallet methods and data.
wallet:read_writeFull access to wallet methods - withdraw, generate deposit addresses, etc.

Block Trading

ScopeDescription
block_trade:readRead-only access to block trading information.
block_trade:read_writeFull access to create and manage block trades.

Block RFQ

ScopeDescription
block_rfq:readRead-only access to Block RFQ information, quotes and available makers.
block_rfq:read_writeFull access to create and quote Block RFQs.

Access Denial Scopes

These scopes explicitly deny access to specific functionality, useful for creating restricted API keys:
ScopeDescription
account:noneExplicitly block access to account management functionality.
trade:noneExplicitly block access to trading functionality.
wallet:noneExplicitly block access to wallet operations.

Token Configuration Parameters

These parameters configure token behavior and security settings:
ParameterDescription
expires:NUMBERSet token expiration time to NUMBER seconds.
ip:ADDRRestrict token usage to specific IPv4 address. Use * to allow all IP addresses.
⚠️ NOTICE: Depending on choosing an authentication method (grant type) some scopes could be narrowed by the server or limited by user API key configured scope, e.g. when grant_type = client_credentials and scope = wallet:read_write could be modified by the server as scope = wallet:read.The user shouldn’t assume that requested values are blindly accepted and should verify assigned scopes.