debian-mirror-gitlab/doc/user/profile/personal_access_tokens.md

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

225 lines
11 KiB
Markdown
Raw Normal View History

2019-10-12 21:52:04 +05:30
---
type: concepts, howto
2020-06-23 00:09:42 +05:30
stage: Manage
2022-04-04 11:22:00 +05:30
group: Authentication and Authorization
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2019-10-12 21:52:04 +05:30
---
2021-10-27 15:23:28 +05:30
# Personal access tokens **(FREE)**
2017-09-10 17:25:29 +05:30
2022-01-26 12:08:38 +05:30
> - Notifications for expiring tokens [introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/3649) in GitLab 12.6.
> - Token lifetime limits [introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/3649) in GitLab 12.6.
> - Additional notifications for expiring tokens [introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/214721) in GitLab 13.3.
> - Prefill for token name and scopes [introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/334664) in GitLab 14.1.
2017-09-10 17:25:29 +05:30
2021-11-11 11:23:49 +05:30
Personal access tokens can be an alternative to [OAuth2](../../api/oauth2.md) and used to:
2022-03-02 08:16:31 +05:30
- Authenticate with the [GitLab API](../../api/index.md#personalprojectgroup-access-tokens).
2021-11-11 11:23:49 +05:30
- Authenticate with Git using HTTP Basic Authentication.
2017-09-10 17:25:29 +05:30
2021-06-08 01:23:25 +05:30
In both cases, you authenticate with a personal access token in place of your password.
2017-09-10 17:25:29 +05:30
2022-10-11 01:57:18 +05:30
WARNING:
The ability to create personal access tokens without expiry was
[deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/369122) in GitLab 15.4 and is planned for removal in GitLab
16.0. When this ability is removed, existing personal access tokens without an expiry are planned to have an expiry added.
The automatic adding of an expiry occurs on GitLab.com during the 16.0 milestone. The automatic adding of an expiry
occurs on self-managed instances when they are upgraded to GitLab 16.0. This change is a breaking change.
2021-11-11 11:23:49 +05:30
Personal access tokens are:
- Required when [two-factor authentication (2FA)](account/two_factor_authentication.md) is enabled.
- Used with a GitLab username to authenticate with GitLab features that require usernames. For example,
2022-07-16 23:28:13 +05:30
[GitLab-managed Terraform state backend](../infrastructure/iac/terraform_state.md#use-your-gitlab-backend-as-a-remote-data-source)
2021-11-11 11:23:49 +05:30
and [Docker container registry](../packages/container_registry/index.md#authenticate-with-the-container-registry),
2022-05-07 20:08:51 +05:30
- Similar to [project access tokens](../project/settings/project_access_tokens.md) and [group access tokens](../group/settings/group_access_tokens.md), but are attached
to a user rather than a project or group.
2021-11-11 11:23:49 +05:30
NOTE:
Though required, GitLab usernames are ignored when authenticating with a personal access token.
There is an [issue for tracking](https://gitlab.com/gitlab-org/gitlab/-/issues/212953) to make GitLab
use the username.
2020-05-24 23:13:21 +05:30
2022-03-02 08:16:31 +05:30
For examples of how you can use a personal access token to authenticate with the API, see the [API documentation](../../api/index.md#personalprojectgroup-access-tokens).
2020-05-24 23:13:21 +05:30
2021-09-30 23:02:18 +05:30
Alternately, GitLab administrators can use the API to create [impersonation tokens](../../api/index.md#impersonation-tokens).
2021-06-08 01:23:25 +05:30
Use impersonation tokens to automate authentication as a specific user.
2017-09-10 17:25:29 +05:30
2021-06-08 01:23:25 +05:30
## Create a personal access token
2017-09-10 17:25:29 +05:30
2022-10-11 01:57:18 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/348660) in GitLab 15.3, default expiration of 30 days is populated in the UI.
2021-06-08 01:23:25 +05:30
You can create as many personal access tokens as you like.
2017-09-10 17:25:29 +05:30
2021-03-11 19:13:27 +05:30
1. In the top-right corner, select your avatar.
1. Select **Edit profile**.
2021-11-11 11:23:49 +05:30
1. On the left sidebar, select **Access Tokens**.
2021-06-08 01:23:25 +05:30
1. Enter a name and optional expiry date for the token.
1. Select the [desired scopes](#personal-access-token-scopes).
2021-03-11 19:13:27 +05:30
1. Select **Create personal access token**.
2017-09-10 17:25:29 +05:30
2021-06-08 01:23:25 +05:30
Save the personal access token somewhere safe. After you leave the page,
you no longer have access to the token.
2017-09-10 17:25:29 +05:30
2021-09-30 23:02:18 +05:30
### Prefill personal access token name and scopes
You can link directly to the Personal Access Token page and have the form prefilled with a name and
list of scopes. To do this, you can append a `name` parameter and a list of comma-separated scopes
to the URL. For example:
```plaintext
https://gitlab.example.com/-/profile/personal_access_tokens?name=Example+Access+token&scopes=api,read_user,read_registry
```
2021-12-11 22:18:48 +05:30
WARNING:
Personal access tokens must be treated carefully. Read our [token security considerations](../../security/token_overview.md#security-considerations)
for guidance on managing personal access tokens (for example, setting a short expiry and using minimal scopes).
2021-06-08 01:23:25 +05:30
## Revoke a personal access token
2017-09-10 17:25:29 +05:30
2021-06-08 01:23:25 +05:30
At any time, you can revoke a personal access token.
1. In the top-right corner, select your avatar.
1. Select **Edit profile**.
2021-11-11 11:23:49 +05:30
1. On the left sidebar, select **Access Tokens**.
2021-06-08 01:23:25 +05:30
1. In the **Active personal access tokens** area, next to the key, select **Revoke**.
2020-07-28 23:09:34 +05:30
2021-06-08 01:23:25 +05:30
## View the last time a token was used
2020-07-28 23:09:34 +05:30
2023-01-13 00:05:48 +05:30
Token usage information is updated every 24 hours. GitLab considers a token used when the token is used to:
- Authenticate with the [REST](../../api/index.md) or [GraphQL](../../api/graphql/index.md) APIs.
- Perform a Git operation.
2017-09-10 17:25:29 +05:30
2021-06-08 01:23:25 +05:30
To view the last time a token was used:
2017-09-10 17:25:29 +05:30
2021-06-08 01:23:25 +05:30
1. In the top-right corner, select your avatar.
1. Select **Edit profile**.
2021-11-11 11:23:49 +05:30
1. On the left sidebar, select **Access Tokens**.
2021-06-08 01:23:25 +05:30
1. In the **Active personal access tokens** area, next to the key, view the **Last Used** date.
## Personal access token scopes
A personal access token can perform actions based on the assigned scopes.
2021-10-27 15:23:28 +05:30
| Scope | Access |
|--------------------|--------|
2022-11-25 23:54:43 +05:30
| `api` | Grants complete read/write access to the API, including all groups and projects, the container registry, and the package registry. |
| `read_user` | Grants read-only access to the authenticated user's profile through the `/user` API endpoint, which includes username, public email, and full name. Also grants access to read-only API endpoints under [`/users`](../../api/users.md). |
| `read_api` | Grants read access to the API, including all groups and projects, the container registry, and the package registry. ([Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/28944) in GitLab 12.10.) |
| `read_repository` | Grants read-only access to repositories on private projects using Git-over-HTTP or the Repository Files API. |
| `write_repository` | Grants read-write access to repositories on private projects using Git-over-HTTP (not using the API). |
| `read_registry` | Grants read-only (pull) access to a [Container Registry](../packages/container_registry/index.md) images if a project is private and authorization is required. Available only when the Container Registry is enabled. |
| `write_registry` | Grants read-write (push) access to a [Container Registry](../packages/container_registry/index.md) images if a project is private and authorization is required. Available only when the Container Registry is enabled. ([Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/28958) in GitLab 12.10.) |
| `sudo` | Grants permission to perform API actions as any user in the system, when authenticated as an administrator. |
2021-06-08 01:23:25 +05:30
## When personal access tokens expire
2020-06-23 00:09:42 +05:30
2021-06-08 01:23:25 +05:30
Personal access tokens expire on the date you define, at midnight UTC.
- GitLab runs a check at 01:00 AM UTC every day to identify personal access tokens that expire in the next seven days. The owners of these tokens are notified by email.
- GitLab runs a check at 02:00 AM UTC every day to identify personal access tokens that expire on the current date. The owners of these tokens are notified by email.
- In GitLab Ultimate, administrators can
2022-07-16 23:28:13 +05:30
[limit the lifetime of access tokens](../admin_area/settings/account_and_limit_settings.md#limit-the-lifetime-of-access-tokens).
2021-06-08 01:23:25 +05:30
## Create a personal access token programmatically **(FREE SELF)**
You can create a predetermined personal access token
as part of your tests or automation.
Prerequisite:
- You need sufficient access to run a
[Rails console session](../../administration/operations/rails_console.md#starting-a-rails-console-session)
for your GitLab instance.
To create a personal access token programmatically:
1. Open a Rails console:
```shell
sudo gitlab-rails console
```
1. Run the following commands to reference the username, the token, and the scopes.
2021-09-30 23:02:18 +05:30
2021-06-08 01:23:25 +05:30
The token must be 20 characters long. The scopes must be valid and are visible
[in the source code](https://gitlab.com/gitlab-org/gitlab/-/blob/master/lib/gitlab/auth.rb).
2021-09-30 23:02:18 +05:30
2021-06-08 01:23:25 +05:30
For example, to create a token that belongs to a user with username `automation-bot`:
```ruby
user = User.find_by_username('automation-bot')
token = user.personal_access_tokens.create(scopes: [:read_user, :read_repository], name: 'Automation token')
token.set_token('token-string-here123')
token.save!
```
This code can be shortened into a single-line shell command by using the
2022-08-13 15:12:31 +05:30
[Rails runner](../../administration/operations/rails_console.md#using-the-rails-runner):
2020-06-23 00:09:42 +05:30
```shell
sudo gitlab-rails runner "token = User.find_by_username('automation-bot').personal_access_tokens.create(scopes: [:read_user, :read_repository], name: 'Automation token'); token.set_token('token-string-here123'); token.save!"
```
2021-06-08 01:23:25 +05:30
## Revoke a personal access token programmatically **(FREE SELF)**
2020-06-23 00:09:42 +05:30
2021-06-08 01:23:25 +05:30
You can programmatically revoke a personal access token
as part of your tests or automation.
2020-06-23 00:09:42 +05:30
2021-06-08 01:23:25 +05:30
Prerequisite:
2020-06-23 00:09:42 +05:30
2021-06-08 01:23:25 +05:30
- You need sufficient access to run a [Rails console session](../../administration/operations/rails_console.md#starting-a-rails-console-session)
for your GitLab instance.
2020-06-23 00:09:42 +05:30
2021-06-08 01:23:25 +05:30
To revoke a token programmatically:
2020-06-23 00:09:42 +05:30
2021-06-08 01:23:25 +05:30
1. Open a Rails console:
```shell
sudo gitlab-rails console
```
2021-09-30 23:02:18 +05:30
2021-06-08 01:23:25 +05:30
1. To revoke a token of `token-string-here123`, run the following commands:
```ruby
token = PersonalAccessToken.find_by_token('token-string-here123')
token.revoke!
```
2020-06-23 00:09:42 +05:30
2021-06-08 01:23:25 +05:30
This code can be shortened into a single-line shell command using the
2022-08-13 15:12:31 +05:30
[Rails runner](../../administration/operations/rails_console.md#using-the-rails-runner):
2020-06-23 00:09:42 +05:30
```shell
sudo gitlab-rails runner "PersonalAccessToken.find_by_token('token-string-here123').revoke!"
```
2023-01-13 00:05:48 +05:30
## Troubleshooting
### Unrevoke a personal access token **(FREE SELF)**
If a personal access token is revoked accidentally by any method, administrators can unrevoke that token.
WARNING:
Running the following commands changes data directly. This could be damaging if not done correctly, or under the right conditions. You should first run these commands in a test environment with a backup of the instance ready to be restored, just in case.
1. Open a [Rails console](../../administration/operations/rails_console.md#starting-a-rails-console-session).
1. Unrevoke the token:
2019-10-12 21:52:04 +05:30
2023-01-13 00:05:48 +05:30
```ruby
token = PersonalAccessToken.find_by_token('<token_string>')
token.update!(revoked:false)
```
For example, to unrevoke a token of `token-string-here123`:
2019-10-12 21:52:04 +05:30
2023-01-13 00:05:48 +05:30
```ruby
token = PersonalAccessToken.find_by_token('token-string-here123')
token.update!(revoked:false)
```
2022-07-23 23:45:48 +05:30
## Alternatives to personal access tokens
For Git over HTTPS, an alternative to personal access tokens is [Git Credential Manager](account/two_factor_authentication.md#git-credential-manager),
which securely authenticates using OAuth.