Documentation

Go to Portal Website

Management API - Overview

The Management API gives trusted integrations programmatic access to AppTego Portal operations. Use it to read configuration, manage builds, query logs, administer users, and integrate tenant data into internal systems.

Use this API for administrative and reporting workflows. For the narrower CI/CD upload-status-download workflow, use the Automation API.

Base URL: https://app.apptego.com/frontend


Authentication

Most Management API endpoints require an authenticated user or API token. The API supports two authenticated request styles.

API Token

Create API tokens in the AppTego Portal under User Management -> API Tokens. API tokens require a Team or Enterprise tenant.

When you create a token, AppTego returns a token_key and token_secret. The secret is shown only once. Combine them with a colon separator, Base64-encode the result, and send it as a Bearer token.

token_key:token_secret -> Base64 encode -> Authorization: Bearer <encoded-value>

Example:

TOKEN=$(printf '%s' "$TOKEN_KEY:$TOKEN_SECRET" | base64)

curl -sS -X POST https://app.apptego.com/frontend/get_applications \
  -H "Authorization: Bearer $TOKEN" \
  -H "tenant: $TENANT_ID" \
  -H "Content-Type: application/json" \
  --data-binary '{}'

API token permissions are stored on the token as tenant-user permissions. New API tokens are created with no permissions; assign only the permissions the integration needs.

Browser Session JWT

The AppTego Portal uses Cognito browser session tokens automatically. Browser session authentication supports email/password login with MFA, Google or social login, and SAML SSO for Enterprise tenants.

Server-side integrations should use API tokens instead of browser session credentials.

Public And Special-Purpose Routes

Some routes do not use the Management API token model:

Route familyAuthentication
/frontend/get_tenants and /frontend/create_tenantAuthenticated user, no tenant header.
/frontend/saml/* browser-flow routesPublic SAML browser flow endpoints.
/automate/*Automation API keys, not Management API tokens.
/frontend/payment/webhook-stripe-445692Stripe webhook signature verification.

Required Headers

HeaderRequiredDescription
AuthorizationYesBearer <base64(token_key:token_secret)> for API tokens, or a Cognito JWT for browser sessions.
tenantUsuallyTenant ID for tenant-scoped /frontend/* calls. Not used by pre-tenant routes such as /frontend/get_tenants and /frontend/create_tenant.
Content-TypeFor JSON requestsapplication/json.

The tenant ID is returned by /frontend/get_tenants and is also visible in the portal tenant context.


Response Format

The API returns standard HTTP status codes. The Lambda transport body is JSON, and the JSON body is the endpoint response directly. Successful responses are not wrapped in a data object.

Success example:

{
  "applications": [
    {
      "application_id": "app-uuid-1234",
      "platform": "android"
    }
  ]
}

Permission denied:

{
  "error": "You don't have permission to do this. The 'Configuration' permission is required.",
  "permission_denied": true,
  "required_permission": "modify_configuration"
}

Plan required:

{
  "error": "API tokens require a Team or Enterprise plan"
}

Authentication failed:

{
  "error": "Authentication failed"
}

Validation error:

{
  "error": "Version is missing"
}

Server error:

{
  "error": "An internal error occurred"
}

Permissions

Tenant membership stores comma-separated internal permission keys. Public docs use the corresponding AppTego Portal labels.

Portal PermissionInternal KeyControls Access To
Configurationmodify_configurationModify security controls, promote configuration, push live configuration, and manage App Integrity settings.
Buildsbuild_applicationsUpload and delete builds, manage signing keys, run legacy signing flows, delete applications, and delete custom library builds.
Certificatesupdate_certificatesManage Certificate Pinning certificate entries.
Custom Messagesmanage_custom_messagesEdit custom message content and active state.
Users & API Managementuser_and_api_managementAdd/remove users, update permissions, manage API tokens, manage automation keys, and manage SAML group mappings.
Tenant Settingsmodify_tenant_settingsRename tenant, update deployment-environment support, manage billing helpers, and configure SAML SSO or custom library identifiers.

Read-only endpoints that do not require a specific permission are accessible to authenticated tenant users and API tokens that belong to the tenant, subject to plan gates.


Subscription Tiers

Some endpoints are restricted by tenant plan.

FeatureFreeTeamEnterprise
API tokensNoYesYes
Automation API keysNoYesYes
User management beyond the ownerNoYesYes
Config promotionNoYesYes
Code signing and signing keysNoYesYes
Custom messagesNoYesYes
Support ticketsNoYesYes
AI Search (/frontend/nl_search_query)NoYesYes
Tego Assistant (/frontend/helpbot/*)Yes, limitedYesYes
Live config pushNoNoYes
Audit and device logsNoNoYes
App IntegrityNoNoYes
SAML SSONoNoYes
Custom Library / BYOANoNoYes

Feature availability for individual controls is also governed by the tenant's current configuration options. Read the relevant options endpoint before enabling controls by API.


Operational Limits

AreaImplemented Limit
API tokensMaximum 20 per tenant.
Automation keysMaximum 10 per tenant.
Portal usersTeam defaults to 20 users; Enterprise defaults to 100 users.
Signing keysMaximum 10 signing keys per platform.
Custom certificatesMaximum 50 custom Certificate Pinning entries per version.
Support ticketsMaximum 10 open tickets per tenant.
Support commentsMaximum 20 comments per ticket.
Tego AssistantDefault weekly limits are 10 Free, 100 Team, and 1000 Enterprise messages per tenant.
AI SearchMonthly limits are 100 Team and 200 Enterprise queries per tenant.

Build upload concurrency and build quotas are plan-dependent and may be overridden by tenant-specific limits.


Quick Reference

See the detailed docs for full request and response examples:

Production Integration Checklist

CheckRecommended practice
Token ownershipUse a named token for each integration.
PermissionsGrant only the required permission categories.
Secret storageStore key material in a vault or secret manager.
Tenant contextSend the intended tenant header for tenant-scoped calls.
Request shapeUse the exact field names documented for each endpoint.
Error handlingHandle authentication, permission, subscription, validation, not-found, rate-limit, and server errors separately.
AuditabilityRecord the integration name, request purpose, and relevant AppTego IDs in your internal logs.