Creating API tokens

Depending on the permissions associated with your API token and the Absolute product licenses associated with your account, some API resources may not be available.

API tokens are created in the Secure Endpoint Console. By default, the token has the same permissions as your assigned user role. This means that if you have access to certain functionality in the Secure Endpoint Console, the token you create has equivalent access in the API.

If your user account is assigned to a one or more device groups when the token is created, the token is assigned to those device groups. If your user account's device group assignment is updated in the future, the token isn't updated. The token is still assigned to the original device groups.

Permissions

When you create the token, you can change the token's permissions. You can't assign permissions to a token that your user role doesn't have, but you can remove permissions. For added security, limit the API token to the minimum permissions required for its intended use. Once the token is created, the permissions for the token can't be changed.

Only those permissions necessary for API calls can be added to an API token.

Permission requirements

To use an endpoint in the API, the token generally requires the same feature permissions that your user role requires to perform the action in the console. For example, to use the GET /reporting/devices endpoint to return basic device information, the token requires the View permissions for both Device Fields and Device reports. The token may also require more permissions depending on the parameters you want to return. For more information about the specific permissions required for each feature, see Absolute API documentation.

Encryption

To create a token that supports asymmetric encryption, you first must generate an elliptical curve public and private key pair outside of the Secure Endpoint Console. Once the keys are generated, you upload the public key in the console.

To create a token that supports symmetric encryption, you generate a token ID and secret key using the console.