Security Settings
Manage API keys, domain restrictions, and security configurations
Security Settings help you protect your Goldilocks account and control access to your widget and API.
Accessing Security Settings
- Go to Settings
- Click Security (or find in account settings)
API Keys
Your API Key
Your API key is used to:
- Authenticate the widget on your site
- Make API calls (if using the API)
- Identify your account
Viewing Your Key
- Go to Settings > Security
- Find API Keys section
- Click to reveal key
Keep your API key secure. While it's designed to be used in client-side code, you should still limit exposure and use domain restrictions.
Regenerating Keys
If your key is compromised:
- Go to API Keys section
- Click Regenerate Key
- Confirm the action
- Update your widget embed code
- Old key stops working immediately
Multiple Keys
Enterprise accounts can have multiple keys:
- Different keys for different environments
- Separate keys for testing/production
- Track usage per key
Domain Restrictions
What Are Domain Restrictions?
Domain restrictions limit where your widget can be loaded. Only websites on your approved list can use your widget.
Why Use Them?
- Prevent unauthorized use
- Block scrapers and bots
- Ensure widget only on your sites
Adding Domains
- Go to Settings > Security
- Find Allowed Domains
- Click Add Domain
- Enter domain (e.g.,
yoursite.com) - Save
Domain Format
| Entry | What It Allows |
|---|---|
yoursite.com | yoursite.com and www.yoursite.com |
*.yoursite.com | All subdomains |
app.yoursite.com | Only that subdomain |
Local Development
For development, add:
localhost
127.0.0.1Or disable restrictions during development (not recommended for production keys).
Testing Restrictions
After adding restrictions:
- Try loading widget on allowed domain ✅
- Try loading on non-allowed domain ❌
- Verify behavior matches expectations
Two-Factor Authentication
Enable 2FA
Add an extra layer of security:
- Go to Settings > Security
- Find Two-Factor Authentication
- Click Enable 2FA
- Scan QR code with authenticator app
- Enter verification code
- Save backup codes
Authenticator Apps
Compatible apps:
- Google Authenticator
- Authy
- 1Password
- Microsoft Authenticator
Backup Codes
After enabling 2FA, save backup codes:
- 10 one-time use codes
- Use if you lose your device
- Store securely (password manager)
Require 2FA for Team
Admins can require 2FA for all users:
- Go to Settings > Security
- Enable Require 2FA for all users
- Users must set up 2FA on next login
Session Security
Session Timeout
Configure how long sessions last:
| Setting | Duration |
|---|---|
| Short | 1 hour |
| Standard | 24 hours |
| Extended | 7 days |
Shorter timeouts are more secure but less convenient.
Active Sessions
View and manage active sessions:
- Go to Settings > Security
- Find Active Sessions
- See all logged-in devices
- Click Revoke to log out a session
Log Out Everywhere
To log out all sessions:
- Go to Settings > Security
- Click Log Out All Sessions
- All sessions terminated (including current)
- Must log in again
Audit Logs
What's Logged
Security-relevant actions are logged:
- Login attempts (success/failure)
- Password changes
- Role changes
- API key regeneration
- Settings changes
Viewing Logs
- Go to Settings > Security
- Find Audit Log
- Browse or filter entries
Log Entry Details
Each entry shows:
- Action - What happened
- User - Who did it
- Time - When it happened
- IP Address - Where from
- Details - Additional context
Exporting Logs
Download logs for review:
- Set date range
- Click Export
- Download CSV or JSON
Data Security
Encryption
Your data is protected by:
- In transit - TLS 1.3 encryption
- At rest - AES-256 encryption
- Backups - Encrypted backup storage
Data Location
Data is stored in:
- Primary: [Region]
- Backups: [Backup region]
Enterprise customers can specify data residency.
Data Retention
How long data is kept:
| Data Type | Retention |
|---|---|
| Conversations | Based on plan (30-365 days) |
| Analytics | 12 months |
| Audit logs | 12 months |
Data Deletion
Request data deletion:
- Contact support
- Specify what to delete
- Deletion processed within 30 days
Or delete your entire account in account settings.
Best Practices
Key Management
- Regenerate keys periodically
- Use different keys for different environments
- Don't commit keys to version control
Domain Restrictions
- Always use in production
- Review allowed domains regularly
- Remove unused domains
Team Security
- Require 2FA for all admins
- Use least-privilege roles
- Review access quarterly
Incident Response
If you suspect a breach:
- Regenerate API keys immediately
- Force logout all sessions
- Review audit logs
- Change passwords
- Contact support if needed