Skip to main content

Overview

Your Courier workspace is where you organize all your notification infrastructure. Understanding workspace management helps you set up environments, secure your API access, migrate content between workspaces, and manage team access effectively.

Environment Management

Courier provides separate environments to help you develop and test safely before deploying to production. Use your test environment for development, testing new integrations, and experimenting with notification designs without affecting your live users. Each environment maintains separate notification templates, integration configurations, user profiles, and analytics data. This isolation ensures that testing and development work doesn’t interfere with your production notification system. For information about environment configuration and management, see the Workspace Settings Documentation.

API Key Management

API keys provide secure access to Courier’s services. Create different keys for different purposes and environments to maintain proper security and access control. Each key can have specific permissions that limit what operations it can perform. Key management includes features for key rotation, usage monitoring, and permission configuration. For information about API key management and authentication, see the API Key Documentation.

Asset Migration

When you need to move notification templates and automation workflows between workspaces or environments, Courier provides export/import functionality and template sharing tools. You can export templates and automations from one workspace and import them into another. For information about template and automation migration, see the Roles & Permissions Documentation.

Team Access Management

Manage who has access to your Courier workspace and what they can do. Set up roles and permissions to ensure team members have the access they need while maintaining security. Available roles include Admin (full access), Editor (create and edit), Viewer (read-only), and Developer (API access). Each role has specific permissions for workspace management, template creation, integration configuration, and analytics access. For information about role configuration and permission management, see the User Roles Documentation.

Next Steps