Get API Key
Generate and manage your API keys to access Dictionary's language and translation services programmatically.
Security Notice: Treat your API keys like passwords. Never expose them in client-side code or public repositories. Use environment variables to store them securely.
Create New API Key
Generate a new key with specific scopes and environment settings.
Existing API Keys
Manage your active keys. Newly generated keys will be shown in full.
| Name | API Key | Environment | Created | Actions |
|---|---|---|---|---|
| Legacy Web App |
sk_dict_••••••••••••••••••••4x9z
|
Production | Oct 12, 2024 | |
| Mobile SDK |
sk_dict_••••••••••••••••••••8m2q
|
Staging | Nov 03, 2024 |
Usage Limits & Rate Limits
Current tier limitations for your account.
Requests / Minute
1,000
Standard Tier
Monthly Volume
500K
Words queried
Concurrent Connections
50
WebSocket / REST
API Keys Allowed
5
Currently using 2
Code Examples
Quick start snippets for integrating Dictionary API into your application.
curl -X GET "https://api.dictionary.com/v1/define/ephemeral" \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json"
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json"
const response = await fetch('https://api.dictionary.com/v1/define/ephemeral', {
headers: {
'Authorization': `Bearer ${process.env.DICTIONARY_API_KEY}`
}
});
const data = await response.json();
console.log(data.meanings[0].definitions[0].definition);
import requests
response = requests.get(
"https://api.dictionary.com/v1/define/ephemeral",
headers={"Authorization": "Bearer YOUR_API_KEY"}
)
data = response.json()
print(data["meanings"][0]["definitions"][0]["definition"])
Security Best Practices
Keep your integrations secure and compliant.
- 01. Store keys in environment variables, never in source code.
- 02. Use separate keys for development and production environments.
- 03. Rotate keys regularly and revoke compromised ones immediately.
- 04. Enable IP whitelisting in production settings for additional protection.
- 05. Monitor usage logs for unexpected spikes or unauthorized access patterns.