Create a new BYOC SIP endpoint. Returns a sip_uri that the customer
pastes into their own telephony platform — no authentication setup
required at the SIP layer. The slug (random 24-char suffix in the
URI) is the bearer credential.
Rate limit: 20 creates per company per day.
Documentation Index
Fetch the complete documentation index at: https://docs.goyappr.com/llms.txt
Use this file to discover all available pages before exploring further.
name + a hyphen + 24 random characters ≈ 120 bits of
entropy) and returns the full URI. The slug is the bearer credential — it’s
the only thing protecting the endpoint from being dialed by strangers, so
treat the URI like an API key.
Hand the sip_uri to the customer. They paste it into their PBX or CPaaS
as the destination for the relevant route — no username or password, just
the URI string.
sip_uri from the response, e.g. sip:after-hours-bz3r3mtypuwuw8tpdw3x392s@yappr-byoc.sip.telnyx.comallowed_source_ips as a JSON array of CIDRs/IPs to restrict which
network sources can reach the endpoint. Useful when the customer’s PBX
has a fixed egress IP. Omit (or pass null) to accept from any source.
Your Yappr API key (e.g. ypr_live_...). Generate one in the dashboard under Settings → API Keys.
Human-readable label, shown in the dashboard.
"After-hours"
Agent that should answer calls routed to this endpoint.
Optional human-readable prefix (max 12 chars). Server
appends a hyphen and a 24-char random suffix to produce
the final slug. Lowercase letters/digits/single hyphens.
Auto-derived from name if omitted.
"after-hours"
Optional list of CIDRs/IPs that may dial this endpoint.
null (default) accepts any source.
SIP endpoint created. Hand the sip_uri to the customer.
A BYOC SIP endpoint. Customers paste the returned sip_uri into their
own telephony system — calls dialed to that URI are routed to the
Yappr agent identified by inbound_agent_id. No authentication is
required at the SIP layer; the slug embedded in the URI is the
bearer credential.
Security model: the slug includes ~120 bits of entropy in its random suffix, so guessing is intractable. Treat the full URI like an API key — anyone with it can dial the agent. To revoke access, delete the endpoint (which makes the URI immediately return 404) and create a new one.
Optional defense in depth: set allowed_source_ips to restrict which
source IPs (or CIDRs) can reach the endpoint. Calls from any other
source are rejected pre-answer.