Skip to main content

From Partner Onboarding to Production: What a Self-Service Developer Portal Actually Needs

Most developer portals are documentation sites with a credential form. A portal that genuinely enables self-service onboarding — from first access to live in production — needs a specific set of capabilities. Here's the complete requirements list.

  • developer-portal
  • partners
  • self-service
  • api-management
  • developer-experience
Zerq team

A developer portal is often described as a "self-service" offering when it is actually a documentation site with a form to request credentials. The partner fills out the form, waits for your team to process it, receives credentials via email, and then discovers that the documentation describes an API that does not behave quite the way they expected. They file a support ticket. The cycle repeats.

True self-service means a partner can go from invitation to first successful production API call without involving your team except where you have deliberately placed a human review step. Everything else — credential provisioning, environment setup, documentation, testing, quota monitoring — is automated and available in the portal.

Here is the complete requirements list for a developer portal that actually achieves self-service.

1. Passwordless sign-in

This is the first impression. If a partner's developer receives an invitation email and has to create an account with a password, fill out a profile form, and wait for email verification, you have already added friction before they have seen a single API endpoint.

Passwordless sign-in (magic link or SSO via the partner organisation's identity provider) removes the password management problem on both sides. The partner does not manage a password for a system they use infrequently. Your support team does not receive "reset my password" tickets.

The requirement is not just that passwordless sign-in exists — it is that it works reliably, that it handles multiple developers from the same organisation, and that it integrates with enterprise SSO configurations that your commercial partners use.

2. Scoped API catalog

A partner who logs in and sees your entire API catalog — including products they are not licensed for, endpoints that are not relevant to their integration, and documentation for APIs in markets they do not operate in — faces an immediate navigation problem.

The catalog must be scoped to the partner's access level. When a partner logs in, they see exactly the APIs and products they are authorised to use. Nothing else.

This requires the portal to use the same access control model as the gateway. If the gateway uses product assignments to control which client can call which endpoints, the portal reads those assignments and filters the catalog accordingly. A partner with a standard-tier assignment sees standard-tier products. A premium-tier partner sees the full catalog for their tier.

Scoped catalog is also a security requirement, not just a UX preference. A partner who can browse documentation for endpoints they cannot access in production is more likely to attempt access and receive opaque 403 errors, generating support tickets and confusion.

3. Interactive try-it with real authentication

Documentation that says "pass your API key in the Authorization header" is not sufficient. A partner's developer needs to make an actual API call and see an actual response before they can confidently write integration code.

The try-it interface must use the partner's actual credentials — the same credentials they will use in production — against the same authentication flow. A try-it interface that bypasses authentication (because it is easier to build) trains partners to expect behaviour that does not match what they will encounter when authentication is enforced.

The try-it interface must also respect the partner's scope. If a credential is granted read access to the payments API, try-it calls to write endpoints should return 403 errors — not succeed because the portal uses a privileged service account for its backend calls.

4. Sandbox credentials on demand

Sandbox credentials must be available immediately. Not in 24 hours after your team reviews the request. Immediately — on the same session as the partner's first sign-in.

The sandbox environment should mirror the production authentication flow. Same credential type (API key, OAuth client credentials, or whatever your production authentication uses). Same request structure. Same response format. Same error codes. The only difference is the data — synthetic in sandbox, real in production.

A sandbox that is significantly simpler than production (no authentication, different error codes, responses that do not match the real API schema) is a trap. Partners integrate successfully in sandbox, encounter unexpected behaviour in production, and file support tickets.

5. Downloadable API specifications

Partners need the OpenAPI specification for every API product they are authorised to use, in a format they can import into their development tooling.

This is not just a documentation feature. It enables partners to:

  • Generate client code from the spec using standard tooling
  • Configure their CI/CD pipeline to test against the latest spec version
  • Set up contract tests that fail if the API changes in a breaking way

The spec must be downloadable per product, in the current version, and in a standard format (OpenAPI 3.x). Version history and changelog should be accessible. If you publish multiple API versions simultaneously, the portal must make clear which version each spec corresponds to.

6. Production onboarding flow with visible status

Moving from sandbox to production requires some form of review — at minimum, confirmation that the partner's integration is ready and that their production credential is being issued for the right product tier.

The production onboarding flow should be a defined process in the portal, not an email to a support inbox. The partner submits the required information (company details, expected usage volume, technical configuration like webhook URLs). The request goes into a visible queue in the portal. The partner can see the status of their request — received, in review, approved, rejected — without emailing your team to ask.

Your team reviews and approves through an admin interface, not an inbox. On approval, the gateway issues production credentials automatically. The partner receives a notification and can retrieve their production credentials from the portal immediately.

The requirement for a human review step is not eliminated — it is made explicit, visible, and fast. The default SLA should be same business day for standard tiers. Partners who do not know the status of their onboarding request will file support tickets.

7. Quota and usage visibility

A partner who cannot see their own API usage will generate support tickets when they approach their quota limit. A partner who exceeds their quota without warning will have a degraded production experience and will blame your API.

The portal must show each partner their current usage against their quota — requests in the current period, quota limit, reset date, and trend. This data should update in near-real-time, not as a 24-hour delayed report.

Alerts are better than a dashboard: notify the partner when they reach 80% and 95% of their quota. Give them a path to request a quota increase from the same interface.

Usage data should also be available for troubleshooting. A partner investigating an issue needs to be able to see their recent API call history — endpoints called, response codes, timestamps — without submitting a support request.

8. Self-service credential rotation

Credentials need to rotate. Keys expire. A developer who set up the integration leaves the organisation. Your security policy requires quarterly rotation. In every case, the partner should be able to rotate their credentials through the portal without involving your team.

The rotation flow must be safe: the partner issues a new credential before the old one is invalidated. There should be a brief overlap period (configurable — 24 hours is typical) during which both credentials are valid, allowing the partner to update their systems before the old credential is revoked.

Your team should not be in the rotation flow except for production credentials at elevated access levels where a security review is appropriate.

9. Multi-developer access per partner organisation

A partner organisation is not a single developer. It is a team. The portal must support multiple developer accounts under the same partner organisation, with shared access to the organisation's credentials and documentation.

The invitation flow must allow a partner's primary contact to invite additional developers. Credentials issued to the partner organisation should be accessible to all developers in the organisation (with appropriate read/write controls on the credentials themselves).

When a developer leaves the partner organisation, their portal access should be removable without revoking the organisation's credentials.

What the support ticket count tells you

A well-designed self-service developer portal should approach zero support tickets for standard onboarding flows. If you are tracking "time from invitation to first successful production call" and "support tickets per new partner in the first 30 days," those metrics reveal whether your portal is actually self-service.

A high ticket count on credential requests means your provisioning is not automated. A high ticket count on "how do I authenticate?" means your try-it flow does not match production. A high ticket count on "I'm getting 403 errors" means your catalog scoping or scope enforcement has a gap.

The portal's job is to make the integration process so clear and the tooling so complete that a competent developer can reach production without your help. Anything that requires your team's involvement is a portal feature that does not exist yet.


Zerq's developer portal includes passwordless sign-in, scoped API catalogs, try-it with real authentication, sandbox credential self-provisioning, production onboarding workflows, quota visibility, self-service credential rotation, and multi-developer organisation support. See the developer portal capabilities or request a demo to walk through a partner onboarding flow end-to-end.