Choosing an authentication method
Choose the authentication method that best fits your use case:OAuth
Best for: Human users, desktop MCP clients, interactive sessions
- Browser-based login flow
- Automatic token refresh
- Works only with MCP protocol
- Access to private data based on authenticated user
API Keys
Best for: Automation, scripts, CI/CD, programmatic access
- Long-lived tokens
- Works with both REST API and MCP server
- Simple Bearer token authentication
- Public data only - team-scoped access
MCP Server
Grapevine runs as a remote MCP server athttps://mcp.getgrapevine.ai. The MCP server supports both OAuth and API key authentication.
See the MCP API documentation for complete protocol details and available tools.
OAuth (Recommended for human users)
OAuth provides a seamless authentication experience for human users connecting through MCP clients. The client automatically handles the browser-based login flow.OAuth authentication enables access to private data based on the authenticated user’s permissions. This allows MCP clients to access personal context that API keys cannot reach.
- Claude Desktop
- Python
API Keys (For programmatic access)
For scripts, automation, and programmatic access, use API keys with the Authorization header:- Claude Desktop
- Python
REST API
Include your API key in theAuthorization header as a Bearer token:
Managing API keys
Creating an API key
API keys are currently team-scoped, and only have access to public information in your tenant. For more information on public vs private data, see Privacy1
Open API Keys page
Navigate to the API Keys page in the Grapevine admin dashboard.
2
Create new key
Click Create API Key and give your key a descriptive name (e.g., “Production Integration”, “Development”).
3
Save your key
Click Create, then copy the key immediately - it will only be shown once.
API keys are shown only once at creation. Store them securely - you won’t be able to see them again.
Viewing keys
You can view all your API keys on the API Keys page. The list shows:- Key name
- Partial key (prefix only)
- Creation date
- Last used date
Revoking keys
1
Open API Keys page
Navigate to the API Keys page.
2
Find and delete
Find the key you want to revoke and click the Delete button.
Security best practices
Choose the right method
Use OAuth for interactive human sessions through MCP clients. Reserve API keys for automation, scripts, and programmatic access.
Store securely
Store API keys in environment variables or secure credential management systems. Never commit them to version control.
Use descriptive names
Name API keys based on their purpose or environment to make management easier.
Rotate regularly
API Keys don’t expire - make sure you rotate them if there is ever a chance they are compromised (such as team changes).