Documentation Index
Fetch the complete documentation index at: https://docs.waffo.ai/llms.txt
Use this file to discover all available pages before exploring further.
Authentication Overview
Waffo Pancake supports two authentication methods for API access:| Method | Use Case | Description |
|---|---|---|
| API Key | Server-to-server calls | Permanent authentication using RSA-SHA256 signatures |
| Store Slug | Public checkout flows | Public access using X-Store-Slug and X-Environment headers |
API Key Authentication
API Keys provide permanent server-to-server authentication using RSA-SHA256 signatures. The private key never leaves your server.Request Headers
API Key authentication does not require the
X-Environment header. Each API Key is bound to either test or prod at creation time. The environment is determined by which key successfully verifies the signature.Using the SDK (Recommended)
Signing Algorithm (Manual Integration)
If you’re not using the SDK, you need to implement RSA-SHA256 request signing:Manual Signing Examples
Store Slug Authentication
For public-facing checkout flows, use Store Slug authentication. This allows visitors to create checkout sessions and query public store data without API Key credentials.Request Headers
Example
Creating API Keys
Create API Key
Click “Create API Key” to generate a new RSA key pair. The public key is sent to the server automatically.
Name and Configure
Give it a descriptive name (e.g., “Production Server”) and select the target environment (Test or Production).
Authentication Method Comparison
| Feature | API Key | Store Slug |
|---|---|---|
| Server-side use | Yes | No |
| Client-side use | No | Yes |
| Requires X-Environment | No | Yes |
| Issue Session Token | Yes | No |
| Create Checkout Session | Yes | Yes |
| Product Management | Yes | No |
| GraphQL Queries | Yes | Yes (public data only) |
| Validity | Permanent (key-controlled) | - |
Authentication Errors
| Status | Error | Solution |
|---|---|---|
| 401 | Invalid signature | Check signing algorithm, private key, and timestamp freshness (5 min window) |
| 401 | Invalid or expired token | Re-authenticate or use a valid API Key |
| 403 | Insufficient permissions | Check if the role has access to the endpoint |
| 400 | Missing authentication | Ensure required headers are present |
Security Best Practices
- Never expose private keys in client-side code, version control, or public repositories
- Use HTTPS for all API requests
- Verify Webhook signatures to prevent forged requests
- Separate test and production keys — create distinct keys for each environment
- Rotate keys regularly, especially after team member changes
- Monitor API usage in the Dashboard for unusual activity