The Credentials Vault stores, encrypted, the credentials (CPF/OAB + password) that lawyers use to authenticate in Brazilian courts. With this, Judit can access lawsuits under judicial secrecy on behalf of the lawyer, without your application ever storing or transmitting the password.Documentation Index
Fetch the complete documentation index at: https://docs.judit.io/llms.txt
Use this file to discover all available pages before exploring further.
🤖 Base endpoint:https://crawler.production.judit.io/credentials. Register once per system/court and reference it later in queries viacredential.customer_key.
When to use
Access to secret lawsuits
Required to query civil and labor lawsuits under judicial secrecy.
Multi-tenant for firms
Use
customer_key to separate credentials per lawyer/client of the firm.LGPD/GDPR compliance
Passwords are stored encrypted in a dedicated vault — your application never transits the password.
Wildcard credential
Register
"system_name": "*" as fallback for courts without a specific credential.Endpoint to register your keys in the credentials vault
To start using the credentials vault, you must make a POST request to thecrawler.production.judit.io/credentials route and register the lawyers’ credentials for the courts made available.
Request Payload
The POST request must include a payload with the following properties:-
system_name: The acronym of the court and system for which the new credential will be registered.Note:A wildcard credential can be registered using"system_name": "*". If a credential is registered under the wildcard, all courts without their own specific credential will use the wildcard credential.
-
customer_key: Custom identifier to associate the credential with a client or lawyer. It can be any name or label defined by whoever is registering the credential, making it easier to organize and manage credentials. -
username: CPF (Cadastro de Pessoas Físicas — Brazilian individual taxpayer ID) or OAB number (Ordem dos Advogados do Brasil — Brazilian Bar Association), as required by the court’s system where the login will be performed. -
password: Password registered at the respective court.
-
custom_data: Optional object intended to store additional information specific to the system or use-case context. It may include custom fields such as a secret required for authentication or other specific settings. -
secret: Two-factor authentication token for the system being registered.
Note: Registered credentials are encrypted, ensuring data security, and cannot be retrieved afterwards. To modify information already registered, simply create a new record using the same customer_key and the same system_name. The new registration will automatically replace the existing credential.
Example payload for registering credentials without two-factor authentication:
Endpoint to verify registered credentials
To check whether a credential is registered, send a GET request to thecrawler.production.judit.io/credentials endpoint, including the customer_key parameter that corresponds to the credential you want to look up.
The response will return every credential available in the vault associated with the queried customer_key. The credential_status field indicates the status of each credential:
- active: Credential registered and active.
- not exists: Credential not found in the system.
Endpoint to delete a key from the Credentials Vault
To delete a system from the credentials vault, you must make a DELETE request to thecrawler.production.judit.io/credentials route.
Request Payload
The DELETE request must include a payload with the following properties:system_name: The acronym of the court and system whose credential will be removed.customer_key: Custom identifier added when the credential was registered.
- If the request succeeds, the response will be an empty object.