Knowledge base
Breadcrumbs

Access Tokens

Last updated: 2018-08-14



Purpose

This article provides the required steps to create Application Access Tokens.

Introduction

The Access Tokens feature in Outpost24 OUTSCAN and HIAB enables users to generate application access tokens that authenticate API requests without requiring a username and password. An access token is a generated key that is included in API requests as the APPTOKEN parameter, allowing external applications or scripts to securely interact with the platform’s API. Tokens are created through Settings → Account → Security Policy, where administrators can define attributes such as the token name, activation status, allowed IP addresses, and access rights. Once created, the token can be used by integrations or automated processes to authenticate requests and perform actions supported by the API.

Customers should use access tokens to enable secure automation and system integration while avoiding the risks associated with embedding user credentials in scripts or applications. By using tokens with defined access rights and optional IP restrictions, organizations can enforce controlled API access for integrations such as third-party tools, custom automation workflows, or service integrations. This approach improves security, simplifies authentication for automated processes, and supports scalable integration with external systems that interact with the Outpost24 platform.

Create a Token

To create a token:

  1. Navigate to Main Menu > Settings > Account.

    Security Policy tab


  2. Select the Security Policy tab.

  3. In the Application Access Tokens area click + New to open the Maintaining App Access Token window.

    Maintaining App Access Token


  4. Fill in the required information and click Save.

The new token is found in the list in the Application Access Tokens area.


Maintaining App Access Token Options

Option

Description

Active

Checking this box will mark the token active.

Name

Indicates the name of the Application.

IP Restriction

Restricting the IP address used by the application.

Access Right

Indicates the type of access right.


Related Articles