doc/user/project/settings/project_access_tokens.md
{{< details >}}
Tier: Free, Premium, Ultimate Offering: GitLab.com, GitLab Self-Managed, GitLab Dedicated
{{< /details >}}
{{< history >}}
{{< /history >}}
Project access tokens provide authenticated access to a specific project. They are similar to group access tokens and personal access tokens, but are scoped to the associated project rather than a group or user. You cannot use project access tokens to access resources in other projects, or to create other group, project, or personal access tokens.
You can use a project access token to authenticate:
Prerequisites:
[!note] On GitLab.com, project access tokens require a Premium or Ultimate subscription. During a trial, you are limited to one project access token.
On GitLab Self-Managed and GitLab Dedicated, project access tokens are available with any license.
{{< history >}}
pat_ip. Enabled by default in 17.9.pat_ip removed.{{< /history >}}
The project access tokens page displays information about your access tokens.
From this page, you can perform the following actions:
[!note] GitLab periodically updates token usage information when the token performs a Git operation or authenticates an operation with the REST or GraphQL API. Token usage times are updated every 10 minutes, token usage IP addresses update every minute.
To view your project access tokens:
Active and usable access tokens are stored in the Active project access tokens section. Expired, rotated, or revoked tokens are stored in the Inactive project access tokens section.
{{< history >}}
buffered_token_expiration_limit. Disabled by default.{{< /history >}}
[!flag] The availability of the extended maximum allowable lifetime limit is controlled by a feature flag. For more information, see the history.
To create a project access token:
A project access token is displayed. Save the project access token somewhere safe. After you leave or refresh the page, you cannot view it again.
All project access tokens inherit the default prefix setting configured for personal access tokens.
[!warning] Project access tokens are treated as internal users. If an internal user creates a project access token, that token can access all projects that have visibility level set to Internal.
{{< history >}}
k8s_proxy introduced in GitLab 16.4 with a flag named k8s_proxy_pat. Enabled by default.k8s_proxy_pat removed in GitLab 16.5.self_rotate introduced in GitLab 17.9. Enabled by default.{{< /history >}}
Scopes define the actions available when you authenticate with a project access token.
| Scope | Description |
|---|---|
api | Grants complete read and write access to the scoped project API, including the container registry, the dependency proxy, and the package registry. |
read_api | Grants read access to the scoped project API, including the package registry. |
read_registry | Grants read access (pull) to container registry images if the project is private and authorization is required. Available only when the container registry is enabled. |
write_registry | Grants write access (push) to the container registry. To push images, you must include the read_registry scope. Available only when the container registry is enabled. |
read_repository | Grants read access (pull) to the repository in the project. |
write_repository | Grants read and write access (pull and push) to the repository in the project. |
create_runner | Grants permission to create runners in the project. |
manage_runner | Grants permission to manage runners in the project. |
ai_features | Grants permission to perform API actions for GitLab Duo, the Code Suggestions API, and the GitLab Duo Chat API. Designed to work with the GitLab Duo Plugin for JetBrains. For all other extensions, see the individual extension documentation. Does not work for GitLab Self-Managed versions 16.5, 16.6, and 16.7. |
k8s_proxy | Grants permission to perform Kubernetes API calls using the agent for Kubernetes in the project. |
self_rotate | Grants permission to rotate this token using the personal access token API. Does not allow rotation of other tokens. |
[!warning] If you have enabled external authorization, personal access tokens cannot access container or package registries. To restore access, turn off external authorization.
{{< history >}}
retain_resource_access_token_user_after_revoke. Disabled by default.retain_resource_access_token_user_after_revoke removed.{{< /history >}}
Rotate a token to create a new token with the same permissions and scope as the original. The original token becomes inactive immediately, and GitLab retains both versions for audit purposes. You can view both active and inactive tokens on the access tokens page.
On GitLab Self-Managed and GitLab Dedicated, you can modify the retention period for inactive tokens.
[!warning] This action cannot be undone. Tools that rely on a rotated access token will stop working until you reference your new token.
To rotate a project access token:
{{< history >}}
retain_resource_access_token_user_after_revoke. Disabled by default.retain_resource_access_token_user_after_revoke removed.{{< /history >}}
Revoke a token to immediately invalidate it and prevent further use. Revoked tokens are not deleted immediately, but you can filter token lists to show only active tokens. By default, GitLab deletes revoked group and project access tokens after 30 days. For more information, see inactive token retention.
[!warning] This action cannot be undone. Tools that rely on a revoked access token will stop working until you add a new token.
To revoke a project access token:
Personal, group, and project access tokens expire at midnight UTC on the expiry date. After they expire, they can no longer be used to authenticate requests.
In GitLab 16.0 and later, new access tokens must have an expiry date. If an expiry date isn't explicitly set during token creation, an expiry date of 365 days from the current date is applied. In GitLab Ultimate, administrators can configure a maximum allowable lifetime for access tokens.
Depending on your GitLab version and offering, your existing access tokens might have an expiry date automatically applied when upgrading GitLab versions. For more information, see non-expiring access tokens.
{{< history >}}
expiring_pats_30d_60d_notifications. Disabled by default.expiring_pats_30d_60d_notifications removed.pat_expiry_inherited_members_notification. Disabled by default.pat_expiry_inherited_members_notification enabled by default in GitLab 17.10.pat_expiry_inherited_members_notification removed in GitLab 17.11{{< /history >}}
GitLab runs a daily check at 1:00 AM UTC to identify project access tokens that expire soon. Direct members with the Owner or Maintainer role are notified by email seven days before a token expires. In GitLab 17.6 and later, notifications are also sent 30 and 60 days before a token expires.
In GitLab 17.7 and later, members with an inherited Owner or Maintainer role can also receive these emails. You can configure this for every group and project on the GitLab instance or a specific parent group. If applied to a parent group, this setting is inherited by all descendant groups and projects.
Expired tokens appear in the inactive project access tokens section until they're automatically deleted. On GitLab Self-Managed, you can modify this retention period.
{{< history >}}
retain_resource_access_token_user_after_revoke. Disabled by default. When enabled new bot users are made members with no expiry date and, when the token is later revoked or expires, the bot user is retained for 30 days.retain_resource_access_token_user_after_revoke removed.{{< /history >}}
When you create a project access token, GitLab creates a bot user and associates it with the token.
Bot users have the following properties:
When the bot user is created, the following attributes are defined:
| Attribute | Value | Example |
|---|---|---|
| Name | The name of the associated access token. | Main token - Read registry |
| Username | Generated in this format: project_{project_id}_bot_{random_string} | project_123_bot_4ffca233d8298ea1 |
Generated in this format: project_{project_id}_bot_{random_string}@noreply.{Gitlab.config.gitlab.host} | [email protected] |
To limit potential abuse, you can restrict users from creating access tokens for projects in a top-level group. Any existing tokens remain valid until they expire or are manually revoked.
For more information, see restrict the creation of group and project access tokens.