Vault
Guide – Managing Access Tokens
Access tokens let you delegate finely-scoped permissions to services, cron jobs or external partners without sharing the admin key.
This guide covers:
- Creating a base access token (server-side)
 - Deriving short-lived signed tokens client-side
 - Listing and revoking tokens
 
Base tokens are created once and stored securely (e.g. in your secrets manager). They cannot be scoped by expiry – instead you define policies that control which operations are allowed.
A signed access token (SAT) is a JWT created entirely on the client side. You derive it from a base token, embed additional policies and set a short expiry.
Send SATs to un-trusted environments (browser, serverless) – they only work until the expiry timestamp and can be revoked centrally by revoking their base token.
Once revoked, all signed tokens derived from the base are automatically invalidated.
- Never ship base tokens to browsers – always derive SATs.
 - Keep expiries short (minutes) for web-apps and serverless functions.
 - Scope by metadata to share the same policies across many EOAs.