Securing Agent Red
Agent Red admin access is protected with API keys, optional two-factor verification, and role-based permissions.
Authentication overview
| Method | Who can use it | Typical use |
|---|---|---|
| API key | All admin-console users | Primary sign-in method |
| Magic link | Registered admin-console users | Passwordless sign-in fallback |
| SMS verification (optional) | Team members with MFA enabled | Additional login protection |
API key authentication
Every team member receives a unique API key when invited. Keys are scoped to that user and role.
- Open the admin login page.
- Enter your API key.
- Continue into the console with permissions for your role.
Protect your API key
Treat your API key like a password. Do not share it in chat, email, screenshots, or source code.
If a key is compromised
- Ask an admin to regenerate the affected key from Team management.
- Remove or revoke any inactive team members.
- Review recent admin activity and escalations.
Magic link authentication
Magic links provide passwordless login for registered team members.
- Click Sign in with magic link.
- Enter your registered email address.
- Open the email and click the one-time link.
Magic links expire quickly and can only be used once.
Optional SMS two-factor verification
Admins can enable SMS-based two-factor verification for team members.
- Open Team management.
- Enable MFA for the target member.
- Register and verify a phone number.
When enabled, sign-in requires:
- API key authentication.
- A one-time SMS verification code.
Repeated invalid attempts are rate-limited and may temporarily lock the challenge flow.
Account recovery
If a team member loses access:
- An admin can regenerate that member's API key.
- The member can use magic link login if their email is still accessible.
- If both key and email access are unavailable, update the member record and issue a new key.
Security best practices
- Store keys in a password manager.
- Enable MFA for privileged users.
- Remove access immediately when team membership changes.
- Use least privilege when assigning roles.
- Rotate keys whenever compromise is suspected.
© 2026 Remaker Digital, a DBA of VanDusen & Palmeter, LLC. All rights reserved.
Was this page helpful?