Nexqloud
Storage

Access Keys

Create and manage S3-compatible access keys for Object Storage

Access Keys

Access keys are S3-compatible credentials that allow programmatic access to your buckets via boto3, aws-cli, or any S3-compatible SDK. Each key consists of an Access Key ID and a Secret Access Key.

Creating an Access Key

  1. Navigate to Object StorageAccess Keys
  2. Click Create Access Key
  3. Enter a Label — a descriptive name for the key (e.g., "Production API", "CI/CD Pipeline")
  4. Choose Bucket Access:
    • All Buckets — key can access every bucket in your account
    • Specific Buckets — select one or more buckets from the list
  1. Click Create

Save Your Credentials

After creation, your credentials are displayed one time only:

  • Access Key ID — format: NQAK followed by 16 characters (e.g., NQAK8f7x9k2m1pq0)
  • Secret Access Key — 40-character random string
Save these credentials immediately. The Secret Access Key is shown only once and cannot be retrieved later. If lost, revoke the key and create a new one.

Copy both values using the copy buttons and store them securely.

Viewing Access Keys

The Access Keys page shows all keys for your account:

ColumnDescription
LabelUser-defined name
Access Key IDPublic key identifier (starts with NQAK)
Buckets"All Buckets" or list of permitted bucket names
StatusActive or Revoked
CreatedCreation timestamp

Revoking a Key

Revoking disables a key immediately while preserving it in your history:

  1. Find the key in the table
  2. Click Revoke (orange button)
  3. The key status changes to Revoked

Revoked keys cannot be used to authenticate API requests. Any application using the key will receive 403 Forbidden errors.

Deleting a Key

Deleting permanently removes a key from your account:

  1. Find the key in the table
  2. Click Delete (red button)
  3. Confirm the deletion

Best Practices

  • Principle of least privilege — scope keys to specific buckets rather than "All Buckets" whenever possible. If a key is compromised, the blast radius is limited to those buckets only.
  • Rotate keys regularly — create a new key, update your applications, then revoke the old key. Aim for rotation every 90 days.
  • Never commit keys to source control — use environment variables or a secrets manager (e.g., AWS Secrets Manager, HashiCorp Vault, or .env files excluded from git).
  • Use descriptive labels — include the application name and environment (e.g., "webapp-prod", "backup-script-staging") so you can identify which key is used where.
  • Revoke before deleting — if you suspect a key is compromised, revoke it immediately to stop access, then investigate before permanent deletion.
  • One key per application — avoid sharing keys across multiple services. This makes rotation and auditing easier.

Next Steps