Getting Your API Key
To access Rulebook Company’s market microstructure data, you’ll need an API key.Request Access
Contact Sales
Email support@rulebook.company with:
- Your firm name and role
- Use case description
- Expected data volume
- Integration timeline
Review Terms
Our team will provide:
- Pricing information
- Data licensing agreement
- Service level agreement (SLA)
- Trial options for qualified firms
Managing Your API Key
Secure Storage
Never hardcode API keys in your source code. Use secure storage solutions:Security Best Practices
Rotate Keys Regularly
Rotate Keys Regularly
- Rotate API keys every 90 days minimum
- Contact support to generate new keys
- Implement zero-downtime key rotation in your systems
Use Separate Keys
Use Separate Keys
- Development environment: separate API key
- Staging environment: separate API key
- Production environment: separate API key
- Never share keys between environments
Restrict Access
Restrict Access
- Limit API key access to authorized personnel only
- Use IP whitelisting when available
- Monitor API usage for anomalies
Monitor Usage
Monitor Usage
- Set up alerts for unusual API call patterns
- Track rate limit usage
- Monitor error rates
Key Rotation
When rotating API keys:- Generate new key: Contact support for a new API key
- Update staging: Deploy new key to staging environment
- Test thoroughly: Verify all integrations work with new key
- Update production: Deploy new key to production
- Revoke old key: Inform support to revoke the old key after 24 hours
Troubleshooting
Common API key issues:401 Unauthorized
401 Unauthorized
429 Rate Limit Exceeded
429 Rate Limit Exceeded
- Check your current rate limits in the dashboard
- Implement exponential backoff in your code
- Contact support to discuss higher limits
403 Forbidden
403 Forbidden
- Verify your subscription includes access to the requested endpoint
- Check if IP whitelisting is configured correctly
- Ensure your key has the necessary permissions
Need Help?
Contact Support
Our team can help with API key management, rotation, and security best practices.

