https://id.copyleaks.com/v3/account/login/api
Login to the Copyleaks API using your email and API key.
Once logged in, you will get back a login token that will be used to authenticate yourself when calling the other API methods.
After generating the login-token, you should attach the token for your next calls. Attaching the endpoint is done by adding this header to your calls: Authorization: Bearer TOKEN
.
A generated token is valid for 48 hours. Within this period of time, you can use it multiple times. Before attaching the Authorization
for your next endpoint calls, make sure that the token has not expired. If it expired, generate a new one.
Request
Body Parameters
email
REQUIRED"[email protected]"
key
REQUIRED"00000000-0000-0000-0000-000000000000"
Request Example
Response
Codes
200
{ "access_token": "ACLNSKNSDAACCAJANCOIUiausoo_saidjaskldjoa...", ".issued": "2018-11-24T16:15:38.2431255+02:00", ".expires": "2018-11-24T16:15:38.2431255+02:00" }
400
{ "email": [ "The email is required." ] }
401
Wrong email address and \ or key.
{ "Message": "Bad request. One or several required parameters are missing or incorrect." }
429
This may happen when sending too many scans in Sandbox mode.
TIP: Reuse your key as much as possible.
Description
access_token
.issued
.expires
Other resources:
- Performance Considerations Important! - How to improve your scan performance.
- Exponential Backoff - Algorithm that helps applications define a retry strategy for consuming a network service.

Do you have a technical question?
Use stackoverflow.com to get help from our development team and other Copyleaks users.