User Authentication Tokens
  • 1 minute to read
  • Dark
    Light
  • PDF

User Authentication Tokens

  • Dark
    Light
  • PDF

Article summary

In this article, we’ll introduce all the essential information about the User Authentication Tokens page. This page allows you to easily view and manage your stored tokens, including the option to delete them when needed.

Authentication via token

Tokens serve as credentials that verify user identity and authorize access to protected resources. Instead of transmitting sensitive credentials on each request, the client securely stores the token and sends it in subsequent interactions, enhancing overall security.

Authentication tokens ensure sensitive information remains protected while users can have a more streamlined experience.

Page details

To search for a Token, simply complete one of the items below:

  • User: Assigned username.
  • Username: Related username.
  • Validated.
    • Yes or No.

Report fields:

ItemDescription
Mark/Unmark all linesSelect specific users.
UserAssigned username.
UsernameRelated username.
Defined inThe date the token was set.
ValidatedWhether the token was validated or not.
Trust the IPIP that the user registered with.
Trust untilThe date on which the token will expire.
ActionDelete the token.

Bottom Icons:

ItemDescription
Delete tokensDeletes the selected token.
Delete tokens and inactivate usersDeletes the selected token and inactivates the user.
Warning

Only users with the role** System Administrator** are allowed to perform token deletions.


Was this article helpful?

What's Next