Telentir’s APIs are served from the Next.js
telentir-web project. All
examples below reference real route handlers in /app/api.Base URLs
| Environment | Base URL | Notes |
|---|---|---|
| Production | https://app.telentir.com/api | Same origin as the Telentir dashboard. |
| Local dev | http://localhost:3000/api | Available when you run npm run dev inside telentir-web. |
Authentication in two layers
- Workspace sessions: Created via the auth endpoints (email + password,
2FA, phone verification). These return JWTs that the frontend stores in the
tokencookie. You can also copy the token and send it as aBearerheader for server-to-server work. - API keys: Long‑lived keys generated from
/api/api-keys. These keys are accepted as bearer tokens everywhere the middlewareobjectAuthorauthis used. Keys inherit the owner’s scopes (phone verification, 2FA, etc.).
objectAuth, which additionally loads the user’s encrypted object
store and enforces phone verification. Bring-your-own encryption keys are
explained in Encrypted objects.
Typical workflow
POST /api/auth/loginto obtain a short-lived JWT or use an API key.GET /api/rootto fetch server metadata, stores, and encryption keys.- Mint store keys with
PUT /api/keysand persist encrypted payloads throughPUT /api/objects. - Subscribe to
GET /api/events/{type}streams to mirror mutations or use/api/connectto ingest data from Telentir-managed scrapers. - Layer on voice/knowledge capabilities via the specialized endpoints listed in the rest of the API reference.
Tooling and schema
OpenAPI playground
Key auth + data-plane endpoints defined for quick prototyping.
Authentication guide
Covers login, phone verification, 2FA, API keys, and password resets.
Encrypted objects
Explains root objects, store keys, publish/unpublish, and event streams.
telentir-web so you can audit the exact server logic.
