Skip to main content

Application Security

Every Application in Grove comes with built-in tools to secure access and control how it interacts with supported networks. Security is enforced through keys and a set of fine-grained access controls, giving you both flexibility and protection.

🔑 Keys

Keys identify and secure your Application.

  • App ID — A permanent identifier built into every endpoint URL. Used to route requests correctly.
  • Secret Key — A private credential used when “Secret Key Required” mode is enabled. Must be passed via HTTP Basic Auth to authenticate requests.

Managing Keys

  • Keys can be copied from the Portal (via the copy icon).
  • Secret Keys are hidden by default — click the eye icon to reveal.
  • Treat your Secret Key like a password: keep it private, rotate periodically, and never commit it to public repos.

🛡️ Access Controls

Tailor how your Application can be used:

  • Secret Key Required — Enforce authentication for every request. Only clients with your Secret Key will be allowed.
  • Approved Chains — Restrict access to specific blockchain networks.
  • Whitelist User-Agents — Only allow trusted HTTP User-Agents.
  • Whitelist Origins — Only allow requests from approved domains.
  • Whitelist Contracts — Limit calls to specified smart contract addresses.
  • Whitelist Methods — Restrict available RPC methods to a safe subset. Each setting can be enabled, edited, or removed directly in the Application’s Security tab.

✅ Best Practices

  • Always enable Secret Key Required for production apps.
  • Combine Secret Keys with whitelists for layered security.
  • Rotate Secret Keys periodically and after any suspected exposure.
  • Limit your Application to only the chains, contracts, and methods it truly needs.

Why It Matters

Grove’s security model keeps your infrastructure both flexible and safe: open enough to support any integration, locked down enough to protect against abuse.