RASL
    • Introduction
    • Authentication
    • Changelog
    • Messages
      • Overview
      • Send Text Message
        POST
      • Send Media Message
        POST
      • Send Template Message
        POST
      • Send Interactive Message
        POST
      • List Messages
        GET
      • Get Message
        GET
    • Auth (OTP/Verification)
      • Overview
      • Send OTP
        POST
      • Verify OTP
        POST
      • Resend OTP
        POST
      • Check OTP Status
        POST
      • List Authentication Templates
        GET
    • Templates
      • Overview
      • List Templates
        GET
      • Get Template
        GET
      • Sync Templates
        POST
    • Contacts
      • Overview
      • List Contacts
        GET
      • Create Contact
        POST
      • Get Contact
        GET
      • Update Contact
        PATCH
      • Delete Contact
        DELETE
      • Batch Create Contacts
        POST
      • Batch Delete Contacts
        DELETE
    • Groups
      • Overview
      • List Groups
      • Create Group
      • Get Group
      • Update Group
      • Delete Group
      • Add Contacts to Group
      • Remove Contacts from Group
    • Account
      • Overview
      • Get Account Info
      • Get Usage Statistics
      • Get Plan Limits
    • Integrations
      • Webhook Format Reference
      • N8N Webhook Integration
      • eCommerce Webhook Integration
        • Webhook Listener
        • WooCommerce Webhook Setup
    Dashboard
    Support
    Support
    • Email
    • WhatsApp
    Dashboard
    Support
    Support
    • Email
    • WhatsApp
    Instagram

    Authentication

    The RASL API uses token-based authentication to securely identify and
    authorize API requests.
    All API requests must include a valid API token in the Authorization
    header using the Bearer authentication scheme.

    Authentication Method#

    RASL APIs use Bearer Token Authentication.
    Each request must include the following HTTP header:
    Alternatively, you can use the X-API-Key header:
    Requests without a valid token will be rejected with a 401 UNAUTHORIZED

    Rate Limiting#

    API requests are rate-limited per token to ensure platform stability and prevent abuse.
    You can monitor your usage through the following response headers:
    X-RateLimit-Limit: Total requests allowed
    X-RateLimit-Remaining: Remaining requests
    X-RateLimit-Reset: Unix timestamp when limit resets
    Exceeding the limit will result in a 429 RATE_LIMIT_EXCEEDED

    Getting Your V2 API Token#

    To generate an API token for RASL API V2, you must log in to your account and create a scoped token through the API Management panel.

    Step 1: Log in to RASL#

    Sign in to your account at: getrasl.io

    Step 2: Navigate to API Management#

    After logging in, go to: System Settings → API Management
    This section allows you to manage API access and tokens for your tenant.

    Step 3: Open V2 Token Management#

    Inside API Management, click: Manage V2 API Tokens
    This section is dedicated to creating and managing scoped tokens for the RASL API v2.

    Step 4: Create a New Token#

    Click Create Token.
    You will be prompted to configure the token settings:

    Token Name#

    Provide a descriptive name (e.g., Backend Server, Mobile App , CRM Integration).

    Scopes#

    Select the required scopes based on your use case.
    Examples:
    messages:send
    messages:read
    templates:read
    account:read
    templates:sync
    Grant only the minimum scopes necessary for security best practices.

    Rate Limit#

    Set the requests-per-minute (RPM) limit for this token.
    The limit cannot exceed your subscription plan allowance.

    Expiration (Optional)#

    You may configure an expiration date for enhanced security.

    Step 5: Save and Secure the Token#

    After creation:
    Copy the token immediately
    Store it securely in a password manager or environment variable
    Never expose it in frontend or client-side applications
    Do not share it publicly
    For security reasons, the token may not be displayed again after creation.

    Security Recommendation#

    Each integration (backend server, automation worker, third-party system) should use a separate token with limited scopes and controlled rate limits.
    This improves security, isolation, and operational control.
    Previous
    Introduction
    Next
    Changelog
    Built with