Guide – Managing Access Tokens
Access tokens let you delegate finely-scoped permissions to services, cron jobs or external partners without sharing the admin key.
This guide covers:
- Creating a base access token (server-side)
- Deriving short-lived signed tokens client-side
- Listing and revoking tokens
Base tokens are created once and stored securely (e.g. in your secrets manager). They cannot be scoped by expiry – instead you define policies that control which operations are allowed.
A signed access token (SAT) is a JWT created entirely on the client side. You derive it from a base token, embed additional policies and set a short expiry.
Send SATs to un-trusted environments (browser, serverless) – they only work until the expiry timestamp and can be revoked centrally by revoking their base token.
Once revoked, all signed tokens derived from the base are automatically invalidated.
- Never ship base tokens to browsers – always derive SATs.
- Keep expiries short (minutes) for web-apps and serverless functions.
- Scope by metadata to share the same policies across many EOAs.