Configure and manage your TypeAuth applications. Learn about core settings, profile attachments, and best practices for securing your API.
Applications are the cornerstone of TypeAuth’s architecture. They serve as the primary configuration point where you define how your API traffic should be handled, secured, and routed.
Every TypeAuth application requires these fundamental settings:
api.yourcompany.com
)api1-{account_slug}-proxy.typeauth.com
api1-acme-proxy.typeauth.com
Applications can be enhanced by attaching various profiles:
Authentication Profiles
Routing Profiles
Fraud & Abuse Profiles
LLM (Language Model) Profiles
Schema Validation Profiles
Profile Organization
Security
Maintenance
For assistance with application configuration or profile management, please contact our support team or refer to our API documentation for detailed examples.
Configure and manage your TypeAuth applications. Learn about core settings, profile attachments, and best practices for securing your API.
Applications are the cornerstone of TypeAuth’s architecture. They serve as the primary configuration point where you define how your API traffic should be handled, secured, and routed.
Every TypeAuth application requires these fundamental settings:
api.yourcompany.com
)api1-{account_slug}-proxy.typeauth.com
api1-acme-proxy.typeauth.com
Applications can be enhanced by attaching various profiles:
Authentication Profiles
Routing Profiles
Fraud & Abuse Profiles
LLM (Language Model) Profiles
Schema Validation Profiles
Profile Organization
Security
Maintenance
For assistance with application configuration or profile management, please contact our support team or refer to our API documentation for detailed examples.