Skip to content

Token

Tokens are used to regulate the access to the application and are therefore a central point for security. With a token you can regulate the following aspects:

  • the access rights for each attribute (r, rw or no access)
  • the exeuction offset for specific attributes. These entries will be executed with the configured offset, but are still shown in the UI or console with the original time of the entry

You can manage these things and all your tokens in our web app.

Login by applications

When you log in to all our applications with username and password, a token is automatically created in the background with the hostname and operating system to identify the token in the web interfce easier.
If you don't want to input your password on our clients, you can also create a new token in the web app and use the raw key instaed. This is also possible for the web app - it's just a bit hidden in this one. Just click on the user icon and the login will change to API-Key.

Note

For API access we recommend to never use your username and password directly. For some features the usage of a token is even required!