Skip to content

Personal Access Tokens

Personal access tokens (PATs) allow individual users to authenticate with the RAMP API without using their regular login credentials. Each token inherits the permissions of the user who created it.

Navigate to Settings > Personal Access Tokens (or /_settings/tokens).

Personal access tokens are useful for:

Use CaseDescription
Personal scriptsAutomating tasks with scripts that run under your identity
Development toolsConnecting IDE plugins or development tools to the RAMP API
TestingQuick API testing during development without full OAuth flows
Ad-hoc integrationsShort-lived integrations that do not warrant a dedicated service account
FeaturePersonal Access TokensService Accounts
IdentityTied to an individual userIndependent machine identity
PermissionsInherits the user’s rolesAssigned independently
ManagementManaged by the userManaged by Administrators
Best forPersonal scripts, developmentProduction integrations, CI/CD
LifecycleTied to the user’s accountIndependent of any user
  1. Navigate to Settings > Personal Access Tokens.
  2. Click Create Token.
  3. Enter a Name that describes the token’s purpose (e.g., “CLI Script”, “Postman Testing”, “VS Code Plugin”).
  4. Optionally set an Expiration Date. Tokens without an expiration date remain valid until manually revoked.
  5. Click Create.
  6. Copy the generated token immediately and store it securely.

Include the personal access token in the Authorization header of your API requests:

Authorization: Bearer <your-token>

The token authenticates as the user who created it, with the same permissions and role access.

The token management page lists all your active tokens with:

  • Token name
  • Creation date
  • Expiration date (if set)
  • Last used date

If a token is compromised or no longer needed:

  1. Navigate to Settings > Personal Access Tokens.
  2. Find the token you want to revoke.
  3. Click Revoke (or Delete).
  4. Confirm the action.

Revoked tokens are immediately invalidated. Any API call using the revoked token will be rejected.

A personal access token inherits all the permissions of the user who created it at the time of each API call. This means:

  • If your roles change (added or removed), the token’s effective permissions change accordingly.
  • If your account is deactivated, the token stops working.
  • The token cannot access more than you can access through the UI.
  • Use descriptive names — name each token after its purpose so you know which to revoke if needed.
  • Set expiration dates — avoid indefinite tokens. Set expiration dates appropriate for the use case.
  • One token per use case — create separate tokens for different tools or scripts. This allows you to revoke access for one tool without affecting others.
  • Never commit tokens — do not store tokens in source code, configuration files checked into version control, or documentation.
  • Rotate periodically — regenerate tokens on a regular schedule, especially those with broad permissions.
  • Revoke unused tokens — regularly review your tokens and revoke any that are no longer in use.
  • Use environment variables — store tokens in environment variables or secret management tools, not in plain text files.