Token format
Xobito API tokens always start withapitk_ and are followed by 64 random characters:
Generating a token
Create a token
Click Create Token and fill in:
- Name — a human-readable label.
- Abilities — the scopes this token is allowed to call (see below).
- Rate limits — optional per-token override.
- Monthly quota — optional cap on total calls per calendar month.
- Expiry — optional
expires_atdate. Leave blank for no expiry.
Using a token
Send the token in theAuthorization header on every request:
Abilities (scopes)
A token’sabilities array controls which endpoints it can call. These are the only valid ability strings:
| Ability | Grants |
|---|---|
contacts.create | Create contacts |
contacts.read | List / read contacts |
contacts.update | Update contacts |
contacts.delete | Delete contacts |
statuses.create | Create contact statuses |
statuses.read | List / read statuses |
statuses.update | Update statuses |
statuses.delete | Delete statuses |
sources.create | Create contact sources |
sources.read | List / read sources |
sources.update | Update sources |
sources.delete | Delete sources |
groups.create | Create groups |
groups.read | List / read groups |
groups.update | Update groups |
groups.delete | Delete groups |
templates.read | List / read WhatsApp templates |
templatebots.read | Read template bot definitions |
messagebots.read | Read message bot definitions |
messages.send | Send text, template, media messages; validate phone numbers; check message status |
messages.send is a single ability that covers all send endpoints (text, template, media), phone validation, and the message-status endpoint. There is no separate messages.read ability.Errors
Missing token
HTTP401:
Invalid token
HTTP401:
Missing ability
HTTP403:
message always includes the specific ability that was required.
Revoking a token
In Settings → API Management, toggleis_active to false on the token. Inactive tokens are rejected with 401 Invalid API token on their next request.
Expired tokens (past expires_at) are rejected automatically.
Security checklist
Store tokens in a secrets manager — never commit them to source control.
Give each integration its own token with the minimum abilities it needs.
Rotate tokens on a regular cadence or when a team member leaves.
Revoke tokens immediately if you suspect leakage.