RelayKey
Demo mode — nothing here is real. Tokens are fake, calls are simulated, no upstream API is touched.
Interactive sandbox

Try the issue / use / audit loop. No signup. No real keys.

We pre-wired a fake HiBob integration. Issue a scoped demo credential, watch how RelayKey allows and blocks calls against the scope you set, and see the audit trail. Everything below runs in your browser.

1

Issue a credential

Pretend we've already added your HiBob master key. Pick the methods and path glob you want this delegated credential to allow, then issue it.

In the real product, only the methods + paths you select pass through. Everything else returns 403 from the proxy before the upstream call is made.

Integration
HiBob
conn_demo

Globs welcome — e.g. /v1/people/*.

2

Make a call

One token, two calls. The first matches your scope and goes through. The second is out of scope and the proxy blocks it before it touches the upstream.

curl
curl https://proxy.relaykey.ai/conn_demo/v1/people \
    -H "Authorization: Bearer rk_proxy_demo_xxxxxxxxxxxx"
Response200 OK
{
  "employees": [
    { "id": "e_401", "name": "Ana Vega", "title": "Recruiter" },
    { "id": "e_402", "name": "Ben Liu", "title": "Engineer" }
  ]
}
3

See it in the audit log

Both calls land in the audit log — the allowed one with a 200, the blocked one with a 403 and a denial reason. Filter by credential, recipient, or status. Export when you need it.

Audit log — conn_demorecipient: kate@northloop.example
2026-05-04T16:42:14ZDELETE/v1/admindenied403······
2026-05-04T16:42:09ZGET/v1/peopleallowed200······

This is what RelayKey looks like with real keys.

Connect your first integration in under three minutes. Free forever for one protected key.