Skip to main content

Automating Your Security Workflow

The FREAKHOSTING Firewall Panel features a strong RESTful API that enables developers to automate network security management. By generating secure API Keys (Access Tokens), you can programmatically list your assigned IP addresses, update granular filtering rules, and retrieve real-time attack telemetry. This is an essential feature for organizations that wish to integrate their server deployment pipelines with our specialized DDoS mitigation infrastructure.

Difficulty

Intermediate

Time

5 Minutes

Token Generation Workflow

Follow these steps to establish a new secure connection point for your automation tools.
1

Access API Management

Log in to the Firewall Portal and navigate to the API Keys tab in the primary menu.
2

Initialize New Key

Click the Create Key or Generate New Key button to open the configuration interface.
3

Define Key Metadata

  • Key Name: Provide a descriptive identifier (e.g., Discord-Bot-Mitigation or Main-Panel-Sync).
  • IP Restriction: (Highly Recommended) Input the specific IP address of the server or application that will be making the API calls.
4

Finalize and Secure

Click Generate. The system will display your unique API key. Copy this key immediately and store it in a secure location.

One-Time Visibility

For your security, the full API key is only displayed once during the generation process. Our database only stores a cryptographic hash of the key. If you close the window without saving the token, you will need to revoke it and generate a new one.

API Security Standards

To maintain the integrity of your network perimeter, we recommend adhering to these technical standards.
Always use the IP Restriction feature. By limiting key usage to your management server’s specific IP address, you ensure that even if the key is leaked, it cannot be utilized by an unauthorized party.

Revocation & Compliance

If you suspect a key has been exposed or if a developer has left your organization, you must revoke the token immediately. Within the API Keys tab, locate the specific key and click the Revoke icon. All active sessions using that key will be terminated instantaneously.
Never hardcode API keys directly into your software’s source code. Instead, use Environment Variables (ENV) or a secure secrets management vault to deliver the token to your application at runtime.

Need Extra Help?

If you encounter any issues, our support team is ready to assist:

Save on Your Hosting

Ready to get a new server? Use code KB20 at checkout for 20% off your first month!

Last Updated: January 2026 | Automation: Enterprise management simplified.