Access tokens classic
This article discusses access tokens used in previous Dynatrace to authenticate to classic Configuration and Environment APIs. For the latest Dynatrace access, see Platform tokens and OAuth clients.
All external access to your Dynatrace monitoring environment relies on two pieces of information: the environment ID and an access token.
Dynatrace uses several types of tokens:
- Access tokens and personal access tokens grant access to:
- Dynatrace API
- Download of OneAgent and ActiveGate installers
- Personal access tokens grant access to some endpoints of Dynatrace API
- Tenant tokens allow OneAgent to report data to Dynatrace
Token format
Dynatrace uses a unique token format consisting of three components separated by dots (.
).
Token example
dt0s01.ST2EY72KQINMH574WMNVI7YN.G3DFPBEJYMODIDAEX454M7YWBUVEFOWKPRVMWFASS64NFH52PX6BNDVFFM572RZM
Token components
Component name
Component description
prefix
The prefix identifies the token type.
In our example: dt0s01
See Token prefixes below for a table of standard prefixes.
public portion
The public portion of the token is a 24-character public identifier.
In our example: ST2EY72KQINMH574WMNVI7YN
token identifier
The token identifier is the combination of the prefix and the public portion. A token identifier can be safely displayed in the UI and can be used for logging purposes.
In our example: dt0s01.ST2EY72KQINMH574WMNVI7YN
secret portion
The secret portion of the token is a 64-character string that should be treated like a password:
- Don't display it
- Don't store it in log files
- Rotate it instantly if it's leaked
In our example: G3DFPBEJYMODIDAEX454M7YWBUVEFOWKPRVMWFASS64NFH52PX6BNDVFFM572RZM
Token prefixes
Prefix
Description
dt0s01
This is an API token. It's used as an authorization method: a valid token allows the user to make changes within the Dynatrace account through SCIM.
- It is generated once.
- Do not reveal the secret portion of a
dt0s01
token. - The public portion is used for identification in the web UI, but you generally should not reveal it (or any portion of this token).
- This token remains in effect until invalidated by the customer, so you must rotate it instantly if it is ever leaked.
dt0s02
OAuth2 Clients created by users through Account Management to be used with Dynatrace Apps and Account Management API.
dt0s03
OAuth2 Clients for internal and external services and integrations.
dt0s04
Chat and identity linking.
dt0s06
This is an OAuth2 Refresh Token, which is used to retrieve a new Access Token and generally changes frequently (typically every 5 to 15 minutes).
dt0s08
OAuth2 Clients for internal and external services and integrations.
dt0s09
Chat and identity linking.
This predictable format offers you several capabilities:
- Use Git pre-commit hooks to avoid pushing tokens to source code repositories (for example, using tools like git-secrets)
- Define masking rules to obfuscate the secret portions of tokens when writing log files
- Detect tokens in internal files or communications
- Enable the GitHub secret scanning service to identify any token pushed to a public GitHub repository
Use this regular expression to look for tokens:
dt0[a-zA-Z]{1}[0-9]{2}\.[A-Z0-9]{24}\.[A-Z0-9]{64}
With the rollout of Dynatrace version 1.210, this format is enabled by default (all newly generated tokens will use the new format).
All existing tokens of the old format remain valid.
Disable the new format
For a limited time, you can opt out of using the new token format:
-
Go to Settings > Integration > Token settings.
-
Turn off Create Dynatrace API tokens in the new format.
Generate an access token
To generate an access token
- Go to Access Tokens.
- Select Generate new token.
- Enter a name for your token.
Dynatrace doesn't enforce unique token names. You can create multiple tokens with the same name. Be sure to provide a meaningful name for each token you generate. Proper naming helps you to efficiently manage your tokens and perhaps delete them when they're no longer needed. - Select the required scopes for the token.
- Select Generate token.
- Copy the generated token to the clipboard. Store the token in a password manager for future use.
You can only access your token once upon creation. You can't reveal it afterward.
Token scopes
Access tokens have fine-grained scopes to limit access to specific product functionality for security reasons.
Name | API value | Description |
---|---|---|
OpenPipeline | ||
OpenPipeline - Ingest Events |
| Grants access to POST Built-in generic events request of the OpenPipeline Ingest API. |
OpenPipeline - Ingest Events, Software Development Lifecycle |
| Grants access to POST Built-in SLDC events request of the OpenPipeline Ingest API. |
OpenPipeline - Ingest Events, Software Development Lifecycle (Custom) |
| Grants access to POST Custom SLDC events request of the OpenPipeline Ingest API. |
OpenPipeline - Ingest Security Events (Built-in)Â |
| Grants access to POST Built-in security events request of the OpenPipeline Ingest API. |
OpenPipeline - Ingest Security Events (Custom) |
| Grants access to POST Custom security events request of the OpenPipeline Ingest API. |
OpenPipeline - Ingest Events (Custom)Â |
| Grants access to POST Custom generic event endpoint request of the OpenPipeline Ingest API. |
API v2 | ||
Read ActiveGates |
| Grants access to GET requests of the ActiveGates API. |
Write ActiveGates |
| Grants access to POST and DELETE requests of the ActiveGates API. |
Create ActiveGate tokens |
| Grants access to the POST request of the ActiveGate tokens API. |
Read ActiveGate tokens |
| Grants access to GET requests of the ActiveGate tokens API. |
Write ActiveGate tokens |
| Grants access to POST and DELETE requests of the ActiveGate tokens API. |
Read API tokens |
| Grants access to GET requests of the Access tokens API. |
Write API tokens |
| Grants access to POST, PUT, and DELETE requests of the Access tokens API. |
Read attacks |
| Grants access to GET requests of the Attacks API and the Settings API for Application Protection ( |
Write Application Protection settings |
| Grants access to POST, PUT, and DELETE requests of the Settings API for Application Protection ( |
Read audit logs |
| Grants access to the audit log. |
Read credential vault entries |
| Grants access to GET requests of the Credential vault API. |
Write credential vault entries |
| Grants access to POST, PUT, and DELETE requests of the Credential vault API. |
Read entities |
| Grants access to GET requests of the Monitored entities and Custom tags APIs. |
Write entities |
| Grants access to POST, PUT, and DELETE requests of the Monitored entities and Custom tags APIs. |
Ingest events |
| Grants access to POST request of the Events API v2. |
Read events |
| Grants access to GET requests of the Events API v2. |
Read extensions monitoring configuration |
| Grants access to GET requests from the Extensions monitoring configuration section of the Extensions 2.0 API. |
Write extensions monitoring configuration |
| Grants access to POST, PUT, and DELETE requests from the Extensions monitoring configuration section of the Extensions 2.0 API. |
Read extensions environment configuration |
| Grants access to GET requests from the Extensions environment configuration section of the Extensions 2.0 API. |
Write extensions environment configuration |
| Grants access to POST, PUT, and DELETE requests from the Extensions environment configuration section of the Extensions 2.0 API. |
Read extensions |
| Grants access to GET requests from the Extensions section of the Extensions 2.0 API. |
Write extensions |
| Grants access to POST, PUT, and DELETE requests from the Extensions section of the Extensions 2.0 API. |
Read Geographic regions |
| Grants access to the Geographic regions API. |
Install and update Hub items |
| Grants permission to install and update extensions via the Hub items API. |
Read Hub related data |
| Grants access to GET requests of the Hub items API. |
Manage metadata of Hub items |
| Grants permission to manage metadata of Hub items via the Hub items API. |
Read JavaScript mapping files |
| |
Write JavaScript mapping files |
| |
Ingest logs |
| Grants access to the POST ingest logs request of the Log Monitoring API v2. |
Read logs |
| Grants access to the GET requests of the Log Monitoring API v2 |
Ingest metrics |
| Grants access to the POST ingest data points request of the Metrics v2 API as well as the OpenTelemetry metrics ingest API. |
Read metrics |
| Grants access to GET requests of the Metrics API v2. |
Write metrics |
| Grants access to the DELETE a custom metric request of the Metrics API v2. |
Read network zones |
| Grants access to GET requests of the Network zones API. |
Write network zones |
| Grants access to POST, PUT, and DELETE requests of the Network zones API. |
Read OneAgents |
| Grants access to GET requests of the OneAgents API. |
Write OneAgents |
| Grants access to POST and DELETE requests of the OneAgents API. |
Ingest OpenTelemetry traces |
| Grants permission to ingest OpenTelemetry traces. |
Read problems |
| Grants access to GET requests of the Problems API v2. |
Write problems |
| Grants access to POST, PUT, and DELETE requests of the Problems API v2. |
Read releases |
| Grants access to the Releases API. |
Read security problems |
| Grants access to GET requests of the Security problems API. |
Write security problems |
| Grants access to POST requests of the Security problems API. |
Read settings |
| Grants access to GET requests of the Settings API. |
Write settings |
| Grants access to POST and DELETE requests of the Settings API. |
Read SLO |
| Grants access to GET requests of the Service-level objectives API. |
Write SLO |
| Grants access to POST, PUT, and DELETE requests of the Service-level objectives API. |
Read synthetic monitor execution results |
| Grants access to GET requests of the |
Write synthetic monitor execution results |
| Grants access to POST request of |
Read synthetic locations |
| Grants access to GET requests of the Synthetic locations API v2 and Synthetic nodes API v2. |
Write synthetic locations |
| Grants access to POST, PUT, and DELETE requests of the Synthetic locations API v2 and Synthetic nodes API v2. |
Tenant token rotation |
| Grants access to the Tenant tokens API. |
Look up a single trace |
| Checks for the presence of a trace in cross-environment tracing. |
Read Unified Analysis page |
| Grants access to the Unified analysis schema in the Settings API. |
API v1 | ||
Access problems and event feed, metrics, and topology |
| Grants access to various calls of Environment API. |
Create and read synthetic monitors, locations, and nodes |
| Grants access to the Synthetic API. |
Read synthetic monitors, locations, and nodes |
| Grants access to GET requests of Synthetic API. |
Read configuration |
| Grants access to GET calls of Configuration API. |
Write configuration |
| Grants access to POST, PUT, and DELETE calls of Configuration API. |
Change data privacy settings |
| Grants access to Data privacy API and data privacy calls of Web application configuration API. |
User sessions |
| Grants access to User sessions API. |
Anonymize user sessions for data privacy reasons |
| Grants access to Anonymization API. |
Mobile symbol file management |
| Grants access to Mobile symbolication API. |
Real User Monitoring JavaScript tag management |
| Grants access to Real User Monitoring JavaScript API. |
ActiveGate certificate management |
| Grants permission to configure certificate on private ActiveGates. |
Fetch data from a remote environment |
| Grants permission to fetch data from remote Dynatrace environments for multi-environment dashboarding. |
Capture request data |
| Grants access to Request attributes API. |
Read log content |
| Grants access to Log Monitoring API. |
PaaS | ||
Download OneAgent and ActiveGate installers |
| Allows download of installers via Deployment API. |
Create support alerts |
| Allows creation of support alerts for crash analysis. |
Other | ||
Upload plugins using the command line |
| Grants permission to upload OneAgent extensions via Extension SDK. |