Tokens authenticate non-interactive clients: agents reporting to the cloud, CI/CD pipelines querying the API, and scripts automating workflows. Each token has a type, a set of scopes, and a lifecycle.Documentation Index
Fetch the complete documentation index at: https://quintsecurity.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Token Types
| Type | Prefix | Purpose | Created by |
|---|---|---|---|
| Personal | qt_pk_ | Individual API access, scripting, local development | Any admin+ member |
| Service | qt_sk_ | CI/CD pipelines, automated integrations, webhooks | Any admin+ member |
| Deploy | qt_dk_ | Agent-to-cloud authentication, device enrollment | Admin+ or install flow |
Personal Tokens
Tied to a specific user. When the user is removed from the org, their personal tokens are automatically revoked. Use these for:- Local scripts and CLI tools
- Personal API exploration
- Development and testing
Service Tokens
Org-scoped, not tied to any individual. Survive member departures. Use these for:- CI/CD pipeline integration
- Automated alerting and reporting
- Third-party tool integration
Deploy Tokens
Issued during device enrollment. Each agent instance gets its own deploy token. Use these for:- Agent-to-cloud event streaming
- Heartbeat and status reporting
- Policy and configuration pulls
Scopes
Every token carries one or more scopes that limit what it can do:| Scope | Allows |
|---|---|
read | Query events, sessions, scores, fleet status |
ingest | Submit events and telemetry (agents only) |
manage | Create/update policies, groups, profiles |
admin | Team management, token operations, org settings |
* | All scopes (use sparingly) |
Scope Combinations
Common patterns:Lifecycle
Create
An admin or owner creates a token via the dashboard or API. The raw token is returned exactly once.
Store securely
The caller stores the raw token in a secrets manager, environment variable, or secure vault. Quint stores only the SHA-256 hash.
Use
Include the token in the
Authorization header as a Bearer token. The API hashes the incoming token and looks up the hash.Rotate
Create a new token with the same scopes, update your clients, then revoke the old token. There’s no in-place rotation — always create-then-revoke.
Security Model
Storage
Authentication Flow
Token Metadata
Each token record stores:| Field | Description |
|---|---|
id | UUID primary key |
org_id | Owning organization |
created_by | User who created it (null for deploy tokens from install flow) |
kind | personal, service, or deploy |
scopes | Array of granted scopes |
name | Human-readable label |
hash | SHA-256 of the raw token |
last_used_at | Timestamp of most recent use |
created_at | Creation timestamp |
revoked_at | Revocation timestamp (null if active) |
API Usage
Create a token:The
token field in the response is the raw token. Save it immediately. It will never appear again in any API response.