Access Security
- Customer sign-in is managed through Clerk-hosted authentication flows.
- API key authentication is required for protected endpoints.
- Per-key controls support activation status, billing plan, and monthly quota overrides.
- We recommend server-side key storage and key rotation for production workloads.
