Because almost all operations in KBC may or do manipulate data in Storage, they must be authorized with a Token (sometimes called Storage API Token, SAPI Token or simply Storage Token).

Tokens are assigned to/by KBC users in the following three situations:

  1. When joining a project – assigned automatically
  2. When creating a new configuration of a component (for example, Orchestrations) – assigned automatically
  3. When sharing a single table from your Storage with someone, without them having to become a project administrator. You can create an unlimited number of tokens with access to all or selected Storage buckets .

Tokens can be managed from the Storage - Tokens page. If they belong to project administrators, they are called Master Tokens. Their description is their user email and they cannot be modified or deleted. The only way to delete Master Tokens is removing the user from the project at the Users & Settings page.

Every token can be refreshed: a new token is generated and the old token becomes immediately invalid. If you invalidate your Master Token, reload your Storage view in the browser. Because tokens allow access to data, you should refresh a token in case there is a suspicion that the token has leaked.

Screenshot - Storage Tokens

Using Limited Tokens

To add users with access limited to only some of your data, create a new, temporary access token:

Screenshot - Access Tokens

Limit access of that token to a single Storage bucket, for instance, ‘out.c-tutorial’. You can also limit the token validity.

Screenshot - Access Tokens

Once the token is created, display its details and send it to an arbitrary email address by clicking the Send token button.

Screenshot - Access Tokens

A message can be added to the email.

Screenshot - Send Token

The recipient will obtain an email with an invitation link leading to the following screen:

Screenshot - Token Welcome Screen

Via the Storage Console, the added user can log into your project.

Screenshot - Storage Console

Only the buckets you made accessible will be seen. If you set the token to expire, it will get deleted automatically after the specified period.

Limited Access to Components

A Storage token itself does not allow the bearer to access KBC via the Administration UI. However, it allows them to call various APIs and run tasks. A Master token has always access to all components, so having the master token allows you to do everything that can be otherwise done via the KBC Administration UI.

When creating a new token, the following rules apply:

  • The token by default gives no access to any of the KBC components;
  • The token bearer can only access permitted Storage buckets via Storage API or Storage Console; and
  • The token cannot be used to run any actions in your project.

For production use, it is recommended not to give away your Master Token, but to create dedicated tokens for different uses. This also simplifies their invalidation as it is clear for what each token is used.

For example, suppose that you need to trigger extracting data from a MySQL database from within your own environment. You would then create a token which is authorized for running the MySQL Database Extractor (keboola.ex-db-mysql component) and write access to the in.c-tutorial bucket (which is used as a destination in the particular configuration you want to run).

Screenshot - Component limited token

You can then give away the token to the person responsible for the database process and be sure that they can use only that particular component in that particular bucket (while they can still reconfigure it, e.g. update the extraction queries). Also, being able to write to a limited set of buckets is a good way how to prevent accidentally overwriting data.