Skip to content

Conversation

@abhijna
Copy link
Collaborator

@abhijna abhijna commented Oct 29, 2025

  • A subject matter expert (SME) reviews the content
  • A technical writer reviews the content or PR

Preview

@abhijna abhijna self-assigned this Oct 29, 2025
@netlify
Copy link

netlify bot commented Oct 29, 2025

Don't forget to add /docs at the end of the deploy preview site URL!

Name Link
🔨 Latest commit 5f4db6a
🔍 Latest deploy log https://app.netlify.com/projects/semgrep-docs-prod/deploys/6924e93edff8f00008d082c6
😎 Deploy Preview https://deploy-preview-2374--semgrep-docs-prod.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link
Collaborator

@khorne3 khorne3 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just some nits

abhijna and others added 8 commits November 3, 2025 09:38
Co-authored-by: Katie Horne <katie.horne@semgrep.com>
Co-authored-by: Katie Horne <katie.horne@semgrep.com>
Co-authored-by: Katie Horne <katie.horne@semgrep.com>
Co-authored-by: Katie Horne <katie.horne@semgrep.com>
Co-authored-by: Katie Horne <katie.horne@semgrep.com>
Co-authored-by: Katie Horne <katie.horne@semgrep.com>
Co-authored-by: Katie Horne <katie.horne@semgrep.com>
Comment on lines 352 to 354
#### Agent tokens

Automatically generated when onboarding repositories for CI/CD scans. These tokens authenticate agents running automated scans within CI environments.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This isn't actually a distinct type of token. They appear as API tokens and can be granted API scope, although the default scope is Agent/CI.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

^ ✅
though I don't mind these as separately calling out the fact that agents make tokens, this section could mention that the generated tokens are the same as API tokens above?

abhijna and others added 2 commits November 6, 2025 11:46
Co-authored-by: Alexis Grant <alexis@semgrep.com>
Co-authored-by: Alexis Grant <alexis@semgrep.com>
Copy link

@mgovea mgovea left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

another thing to optionally mention: a token's secret is not saved anywhere as-is and must be saved securely because it cannot be accessed after the token's creation

These tokens are created by admins in Semgrep AppSec Platform. They are used for API access, integrations, and automation.

Some features of these tokens:
- They are not tied to a specific user account, and remain valid until manually revoked, even if the creator is no longer associated with the deployment.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[Nit / me ignorant] Do double spaces even show up on the website?

Suggested change
- They are not tied to a specific user account, and remain valid until manually revoked, even if the creator is no longer associated with the deployment.
- They are not tied to a specific user account, and remain valid until manually revoked, even if the creator is no longer associated with the deployment.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, are they "not tied to a specific user account"? @zyannes
I know we have user in some cases, but maybe that's just CLI tokens...

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

correct - Zach can confirm, but we tell folks this often. The token, once generated, is independent of the generating user.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is from Zach:

Technically API and CLI tokens can be associated with a user account, and therefore assume that user's role/scopes. However, in practice we only allow API tokens to be created by admins which therefore makes them "admin tokens"; the associated user in this case is more of an auditing "this user created this token"

Comment on lines 352 to 354
#### Agent tokens

Automatically generated when onboarding repositories for CI/CD scans. These tokens authenticate agents running automated scans within CI environments.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

^ ✅
though I don't mind these as separately calling out the fact that agents make tokens, this section could mention that the generated tokens are the same as API tokens above?

abhijna and others added 5 commits November 17, 2025 13:24
Co-authored-by: Alexis Grant <alexis@semgrep.com>
…re-detail' of github.com:semgrep/semgrep-docs into abhijnaparigi/tec-445-explain-how-api-tokens-work-in-more-detail
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants