Reeve
Authentication

API Keys

Manage LLM provider keys, understand BYOK vs managed models, and configure auth profiles.

API Keys

Reeve needs access to at least one LLM provider to power your agents. You can use your own API keys (BYOK) or managed models through Reeve Cloud.

BYOK vs Managed

FeatureBYOK (Bring Your Own Key)Managed
SetupAdd your API key from the providerIncluded with Reeve Cloud subscription
BillingBilled directly by the providerDeducted from Reeve credit balance
ControlFull control over model selection and spendSimplified — no external accounts needed
AvailabilityAll models from all providersCurated selection

You can mix both — use managed models for convenience and BYOK for specific providers.

Adding API Keys

Navigate to Settings → Models in the Cockpit

Click Add Provider and select the provider

Paste your API key

Click Test — Reeve makes a real API call to verify the key works

Click Save

The UI shows a green indicator for connected providers and lets you drag-reorder the fallback chain.

Interactive setup:

reeve configure --section auth

Or via the onboarding wizard:

reeve onboard

Both walk you through adding provider keys interactively.

Edit reeve.json directly:

{
  "models": {
    "providers": {
      "anthropic": {
        "apiKey": "sk-ant-api03-..."
      },
      "openai": {
        "apiKey": "sk-..."
      },
      "openrouter": {
        "apiKey": "sk-or-..."
      }
    }
  }
}

Supported Providers

ProviderKey prefixWhere to get it
Anthropicsk-ant-console.anthropic.com
OpenAIsk-platform.openai.com
OpenRoutersk-or-openrouter.ai/keys
Google (Gemini)AI...aistudio.google.com
Amazon BedrockIAM credentialsAWS Console
OllamaNone (local)ollama.com

See Providers for the complete list and model-specific configuration.

Fallback Chain

When your primary provider fails (rate limit, outage, network error), Reeve automatically tries the next provider in the chain:

{
  "models": {
    "fallback": ["anthropic", "openai", "openrouter"]
  }
}

In this example, if Anthropic fails, Reeve tries OpenAI. If OpenAI also fails, it tries OpenRouter. Configure the order in the Cockpit via drag-and-drop, or in the config file.

See Model Failover for details on how failover works.

Auth Profiles

API keys are stored in auth profiles — encrypted files in the agent workspace:

~/.reeve/agents/<agentId>/agent/auth-profiles.json

Auth profiles support multiple key sources:

  • Direct API keys (most common)
  • OAuth credentials (for providers that support it)
  • Environment variables (ANTHROPIC_API_KEY, OPENAI_API_KEY)

Reeve resolves keys in this order:

  1. Auth profile for the specific agent
  2. Global config (models.providers.*.apiKey)
  3. Environment variables

Key Security

  • API keys are stored encrypted via Reeve's TokenVault
  • Keys are never exposed to agents — agents call tools, tools use keys internally
  • Keys are never logged or included in error messages
  • When displayed in the UI, keys are masked (e.g., sk-ant-...****)
  • You can test keys before saving to avoid storing invalid credentials

Never share your API keys or commit them to version control. Use environment variables or the Cockpit UI for key management. Reeve encrypts stored keys, but the encryption is only as strong as your filesystem security.

Environment Variables

For server deployments, you can set keys via environment variables instead of config files:

export ANTHROPIC_API_KEY="sk-ant-..."
export OPENAI_API_KEY="sk-..."
export BRAVE_API_KEY="BSA..."

These are picked up automatically by the gateway on startup.

On this page