API Tokens
API tokens provide secure, programmatic access to your organization's resources. Tokens are scoped to your organization and can be used to authenticate API requests without user credentials.
Current Capabilities
API tokens currently support:
- SCIM Provisioning – Automate user and group management from your identity provider (Okta, Azure AD, etc.)
Additional API endpoints will be supported with API tokens in future releases.
Generating a Token
- Navigate to Admin Settings in your organization
- Find the API Tokens section
- Click Generate Token
- Enter a descriptive name (e.g., "Okta SCIM Integration")
- Click Generate
- Copy your token immediately – it will not be shown again
The token is displayed only once after generation. Store it securely. If you lose the token, you'll need to generate a new one.
Using the Token
Include the token in the Authorization header of your API requests:
curl -H "Authorization: Bearer wxt_xxxxx" \
https://your-domain.example.com/scim/v2/Users
Token Format
Tokens are prefixed with wxt_ followed by a cryptographically random string:
wxt_aBcDeFgHiJkLmNoPqRsTuVwXyZ1234567890abc
Security
- Hashed Storage – Tokens are hashed before being stored. The plain token is never persisted.
- Organization Scoped – Each token is tied to a specific organization.
- Usage Tracking – The system tracks when each token was last used.
- Revocable – Tokens can be revoked instantly from the Admin Settings.
Revoking a Token
- Navigate to Admin Settings
- Find the token in the API Tokens list
- Click the trash icon next to the token
- Confirm the revocation
Revoking a token immediately invalidates it. Any integrations using that token will stop working.
Best Practices
- Use descriptive names – Name tokens after their purpose (e.g., "Okta SCIM", "Azure AD Sync")
- Rotate tokens periodically – Generate new tokens and revoke old ones on a regular schedule
- Use separate tokens – Create different tokens for different integrations
- Monitor usage – Check the "Last used" timestamp to identify unused tokens
- Revoke unused tokens – Remove tokens that are no longer needed
On-Premises Deployments
For on-premises deployments, you can alternatively use the AUTH_SECRET environment variable for SCIM authentication. This provides backward compatibility for simpler setups that don't require multiple tokens.
See SCIM Provisioning for more details on configuring SCIM endpoints.