This page covers the configuration used to control how the Blnk server listens for requests, protects access to the API, and enables tokenization for sensitive identity fields.Documentation Index
Fetch the complete documentation index at: https://docs.blnkfinance.com/llms.txt
Use this file to discover all available pages before exploring further.
Server settings
Use the server settings below to configure how Blnk exposes its API and enforces authentication.| Description | Default | |
|---|---|---|
BLNK_SERVER_SECURE | Enables additional secure-mode protections for the server. | false |
BLNK_SERVER_SECRET_KEY | Secret used for signing and other cryptographic operations. | None |
BLNK_SERVER_PORT | The port Blnk listens on for incoming HTTP requests. | 5001 |
BLNK_SERVER_SECURE
This controls whether API authentication is enforced when you make requests to the server. When set to false, Blnk skips authentication checks.
When set to true, requests must authenticate via X-Blnk-Key header using one of the following:
-
the master key,
BLNK_SERVER_SECRET_KEY -
a stored API key
API keys
Learn how to create and manage API keys with custom permissions for secure requests.
BLNK_SERVER_SECRET_KEY
This is required for any secure Blnk deployment. It is used in two places in Blnk:
- As the master API key for authenticated requests to the server
-
As the HMAC signing secret for outgoing webhooks and hook callbacks.
Webhook security
Learn how to verify webhook signatures and protect webhook consumers.
Best practices
- Set
BLNK_SERVER_SECURE=truein any real deployment. - Use a strong secret for
BLNK_SERVER_SECRET_KEY, and make sure to store secrets outside version control. - Keep the server secret stable within an environment unless you are prepared to update any systems that verify webhook signatures.
Tokenization settings
Use tokenization settings to enable encryption and token generation when using the PII Tokenization feature.| Description | Default | |
|---|---|---|
BLNK_TOKENIZATION_SECRET | Enables tokenization for sensitive identity fields. Must be exactly 32 bytes long. Used as the cryptographic secret for tokenization operations. | Disabled when unset |
Tokenization behaviour
Tokenization is only enabled whenBLNK_TOKENIZATION_SECRET is set and is exactly 32 bytes long. If the secret is missing, tokenization is disabled. If the secret is set but not 32 bytes long, Blnk does not fail startup, but tokenization operations may fail when called.
When enabled, Blnk uses this secret for AES-GCM encryption in standard tokenization and HMAC-based seeding for format-preserving tokenization.
Note: Store this secret securely and keep it stable for each environment. If you change it after data has already been tokenized, previously tokenized values may no longer detokenize correctly.
Rate limiting
Use rate limiting settings to protect the API from abuse and to control traffic spikes more predictably.| Description | Default | |
|---|---|---|
BLNK_RATE_LIMIT_RPS | Maximum requests allowed per second per client. | 5000000 |
BLNK_RATE_LIMIT_BURST | Maximum short burst allowed above the RPS limit. | 10000000 |
BLNK_RATE_LIMIT_CLEANUP_INTERVAL_SEC | Cleanup interval for expired rate-limit data, in seconds. | 10800 |
Rate limiting behaviour
If bothBLNK_RATE_LIMIT_RPS and BLNK_RATE_LIMIT_BURST are unset, Blnk applies its built-in defaults.
If you set only one of those two values, Blnk derives the other automatically:
- if only
BLNK_RATE_LIMIT_RPSis set,burstdefaults to2 * RPS - if only
BLNK_RATE_LIMIT_BURSTis set,requests_per_seconddefaults toburst / 2