Skip to content

Endpoints & Operations

Overview

Anka Secure API endpoints are grouped into functional categories:

  • Authentication – Manage JWT tokens.
  • Key Management – Create, import, export, revoke cryptographic keys.
  • Secure Operations (Non-Streaming) – Standard cryptographic operations (encrypt, decrypt, sign, verify).
  • Secure Operations (Streaming) – Operations optimized for large files (multipart/form-data streaming).
  • Licensing & Monitoring – Access license information and system metrics.

Base URL

https://demo.ankatech.co

Endpoints are protected and require authentication via JWT Bearer Tokens or API keys.

Security Schemes

  • JWT Bearer (Authorization: Bearer <token>)

  • API Key (x-rapidapi-key: <api-key>)

For detailed endpoint descriptions, examples, parameters, and responses, refer to the dedicated subsections: