Skip to main content

Dash API

Learn how to set up, authorize, and securely use the Dash API with endpoints, filters, examples, and best practices.

Angel Horowitz avatar
Written by Angel Horowitz
Updated yesterday

๐Ÿ“ Overview

The Dash API provides developers and administrators with a way to access, query, and extend data from the software. It follows the JSON:API Specification and supports operations such as filtering, pagination, and relations.

The API is best suited for:

  • Pulling data into external reporting tools

  • Automating exports

  • Building lightweight integrations

It is not designed for bulk/batch updates or extremely high-volume transactional activity.

๐Ÿ“š Helpful Links


๐Ÿ”‘ Authorizations

Click the arrow to learn about required authorizations

To create, edit, or manage API keys, staff members must have the API Key Management authorization assigned to their role.

โš ๏ธ Without this authorization, users cannot access the API Key Management screen.


๐Ÿ› ๏ธ API Key Setup & Management

๐Ÿ—๏ธ Creating an API Key

Click the arrow to learn how to generate an API key

  1. From the Global Search, type in API Keys

  2. Click + Create

  3. Enter a descriptive name and choose the role for key permissions

  4. Copy and securely store the generated key (you will not see it again)

๐Ÿ”’ Security Note: Keys inherit the authorizations of their assigned role. Apply least privilege whenever possible.

โœ๏ธ Editing & Deleting an API Key

Click the arrow to learn how to manage existing API keys

Editing an API Key

  1. From the API Key page, locate the appropriate key.

  2. Click the โ‹ฎ (three dots) menu

  3. Select Edit to update the name or assigned role

Deleting an API Key

  1. Click the โ‹ฎ menu on the key

  2. Select Delete

  3. Confirm the deletion

Additional Options

  • Click More Details beneath a key for additional information

  • Use Show Expired Keys or Show Deleted Keys toggles at the top right if needed

๐Ÿ”’ Security & Permissions

Click the arrow to learn about API key security

  • Treat API keys like passwords โ€” store them securely

  • Rotate keys if compromised or when staff leave

  • Keys expire only when manually disabled or deleted

  • Never share keys over email. Instead, use a secure tool like One Time Secret to transmit credentials safely

  • If you suspect a key has been compromised, delete it immediately and create a new one


โš ๏ธ Limitations & Performance Considerations

Click the arrow to learn about API limits

  • Paging limit: Maximum of 100 results per page

  • No batch updates: Only single-record modifications are supported

  • Performance: Large collections may return slowly; use filters and pagination

  • Permissions restricted: API keys cannot exceed the roleโ€™s assigned authorizations

Did this answer your question?