Access tokens
Dynatrace version 1.227+
This page describes the UI approach available starting with Dynatrace version 1.227. For procedure for an older version, see the legacy description. Alternatively, you can use the Tokens API v2.
All external access to your Dynatrace monitoring environment relies on two pieces of information: the environment ID and an access token.
Dynatrace uses several types of tokens:
- Access tokens and personal access tokens grant access to:
- Dynatrace API
- Download of OneAgent and ActiveGate installers
- Access to module integrations
- Tenant tokens allow OneAgent to report data to Dynatrace
Token format
Dynatrace uses a unique token format consisting of three components separated by dots (.
).
dt0c01.ST2EY72KQINMH574WMNVI7YN.G3DFPBEJYMODIDAEX454M7YWBUVEFOWKPRVMWFASS64NFH52PX6BNDVFFM572RZM
The part of a token composed of the prefix and public portion is a token identifier. For example dt0c01.ST2EY72KQINMH574WMNVI7YN
. Token identifier can be safely displayed in the UI and can be used for logging purposes.
| Prefix to identify the token type. |
| Public portion of token |
| Secret portion of token |
The predictable format gives you several advantages, such as:
- Using Git pre-commit hooks to avoid pushing tokens to source code repositories (for example, using tools like git-secrets)
- Defining masking rules to obfuscate the secret portions of tokens when writing log files
- Detecting tokens in internal files or communications
- Enabling the GitHub secret scanning service to identify any token pushed to a public GitHub repository
Use this regular expression to look for tokens:
dt0[a-zA-Z]{1}[0-9]{2}\.[A-Z0-9]{24}\.[A-Z0-9]{64}
With the rollout of Dynatrace version 1.210, this format is enabled by default (all newly generated tokens will use the new format).
All existing tokens of the old format remain valid.
Disable the new format
For a limited time, you have the option to opt out of using the new token format. You can find the setting here:
- SaaS and environment-wide Managed Go to Settings > Integration > Token settings.
- Managed cluster In the CMC web UI, go to Settings > API tokens.
Generate an access token
To generate an access token
- In the Dynatrace menu, select Access tokens.
- Select Generate new token.
- Enter a name for your token.
Dynatrace doesn't enforce unique token names. You can create multiple tokens with the same name. Be sure to provide a meaningful name for each token you generate. Proper naming helps you to efficiently manage your tokens and perhaps delete them when they're no longer needed. - Select the required scopes for the token.
- Select Generate.
- Copy the generated token to the clipboard. Store the token in a password manager for future use.
You can only access your token once upon creation. You can't reveal it afterwards.
Token scopes
Access tokens have fine-grained scopes to limit access to specific product functionality for security reasons.
Dynatrace provides the following permissions for API tokens. You can set them in the web UI as described above or via the Access tokens API. Some scopes are only available via API.
Name | API value | Description |
---|---|---|
API v2 | ||
Read metrics |
| Grants access to GET requests of the Metrics API v2. |
Write metrics |
| Grants access to the DELETE a custom metric request of the Metrics API v2. |
Ingest metrics |
| Grants access to the POST ingest data points request of the Metrics v2 API as well as the OpenTelemetry metrics ingest API. |
Read logs |
| Grants access to the GET requests of the Log Monitoring API v2 |
Ingest logs |
| Grants access to the POST ingest logs request of the Log Monitoring API v2. |
Ingest OpenTelemetry traces |
| Allows to ingest OpenTelemetry traces. |
Look up a single trace |
| Checks for the presence of a trace in cross-environment tracing. |
Read entities |
| Grants access to GET requests of the Monitored entities and Custom tags APIs. |
Write entities |
| Grants access to POST, PUT, and DELETE requests of the Monitored entities and Custom tags APIs. |
Read problems |
| Grants access to GET requests of the Problems API v2. |
Write problems |
| Grants access to POST, PUT, and DELETE requests of the Problems API v2. |
Read events |
| Grants access to GET requests of the Events API v2. |
Ingest events |
| Grants access to POST request of the Events API v2. |
Read network zones |
| Grants access to GET requests of the Network zones API. |
Write network zones |
| Grants access to POST, PUT, and DELETE requests of the Network zones API. |
Read ActiveGates |
| Grants access to GET requests of the ActiveGates API. |
Write ActiveGates |
| Grants access to POST and DELETE requests of the ActiveGates API. |
Read ActiveGate tokens |
| Grants access to GET requests of the ActiveGate tokens API. |
Create ActiveGate tokens |
| Grants access to the POST request of the ActiveGate tokens API. |
Write ActiveGate tokens |
| Grants access to POST and DELETE requests of the ActiveGate tokens API. |
Read extensions |
| Grants access to GET requests from the Extensions section of the Extensions 2.0 API. |
Write extensions |
| Grants access to POST and DELETE requests from the Extensions section of the Extensions 2.0 API. |
Read extensions environment configuration |
| Grants access to GET requests from the Extensions environment configuration section of the Extensions 2.0 API. |
Write extensions environment configuration |
| Grants access to POST, PUT, and DELETE requests from the Extensions environment configuration section of the Extensions 2.0 API. |
Read extensions monitoring configuration |
| Grants access to GET requests from the Extensions monitoring configuration section of the Extensions 2.0 API. |
Write extensions monitoring configuration |
| Grants access to POST, PUT, and DELETE requests from the Extensions monitoring configuration section of the Extensions 2.0 API. |
Read security problems |
| Grants access to GET requests of the Security problems API. |
Write security problems |
| Grants access to POST requests of the Security problems API. |
Read synthetic locations |
| Grants access to GET requests of the Synthetic locations API v2 and Synthetic nodes API v2. |
Write synthetic locations |
| Grants access to POST, PUT, and DELETE requests of the Synthetic locations API v2 and Synthetic nodes API v2. |
Read settings |
| Grants access to GET requests of the Settings API. |
Write settings |
| Grants access to POST and DELETE requests of the Settings API. |
Tenant token rotation |
| Grants access to the Tenant tokens API. |
Read SLO |
| Grants access to GET requests of the Service-level objectives API. |
Write SLO |
| Grants access to POST, PUT, and DELETE requests of the Service-level objectives API. |
Read API tokens |
| Grants access to GET requests of the Access tokens API. |
Write API tokens |
| Grants access to POST, PUT, and DELETE requests of the Access tokens API. |
Read releases |
| Grants access to the Releases API. |
Read audit logs |
| Grants access to the audit log. |
Read Geographic regions |
| Grants access to the Geographic regions API. |
Read synthetic monitor execution results |
| Grants access to GET requests of the |
Write synthetic monitor execution results |
| Grants access to POST request of |
Read credential vault entries |
| Grants access to GET requests of the Credential vault API. |
Write credential vault entries |
| Grants access to POST, PUT, and DELETE requests of the Credential vault API. |
API v1 | ||
Access problems and event feed, metrics, and topology |
| Grants access to various calls of Environment API. |
Create and read synthetic monitors, locations, and nodes |
| Grants access to the Synthetic API. |
Read synthetic monitors, locations, and nodes |
| Grants access to GET requests of Synthetic API. |
Read configuration |
| Grants access to GET calls of Configuration API. |
Write configuration |
| Grants access to POST, PUT, and DELETE calls of Configuration API. |
Change data privacy settings |
| Grants access to Data privacy API and data privacy calls of Web application configuration API. |
User sessions |
| Grants access to User sessions API. |
Anonymize user sessions for data privacy reasons |
| Grants access to Anonymization API. |
Mobile symbol file management |
| Grants access to Mobile symbolication API. |
Real User Monitoring JavaScript tag management |
| Grants access to Real User Monitoring JavaScript API. |
ActiveGate certificate management |
| Allows to configure certificate on private ActiveGates. |
Data ingest |
| Allows to import data and events from external sources. |
Fetch data from a remote environment |
| Allows to fetch data from remote Dynatrace environments for multi-environment dashboarding. |
Capture request data |
| Grants access to Request attributes API. |
Read log content |
| Grants access to Log Monitoring API. |
RUM browser extension |
| Allows the RUM browser extension to send data to Dynatrace. |
Read OneAgents |
| Grants access to GET requests of the OneAgents API. |
Write OneAgents |
| Grants access to POST and DELETE requests of the OneAgents API. |
PaaS | ||
Download OneAgent and ActiveGate installers |
| Allows download of installers via Deployment API. |
Create support alerts |
| Allows creation of support alerts for crash analysis. |
Other | ||
Upload plugins using the command line |
| Allows to upload OneAgent extensions via Extension SDK. |