Managing HTTP access tokens
Administer Bitbucket Data Center
- Users and groups
- 高度なリポジトリ管理
- 外部ユーザー ディレクトリ
- グローバル権限
- Setting up your mail server
- アトラシアン アプリケーションとの連携
- Connect Bitbucket to an external database
- Migrating Bitbucket Data Center to another server
- Migrate Bitbucket Server from Windows to Linux
- Run Bitbucket in AWS
- Specify the Bitbucket base URL
- Configuring the application navigator
- アプリの管理
- 監査ログの表示と設定
- Update your license key
- Configuration properties
- Bitbucket のコンテキスト パスを変更する
- Data recovery and backups
- Git リポジトリへの HTTP(S) アクセスの無効化
- Mirrors
- Bitbucket Mesh
- プロジェクトとリポジトリのエクスポートとインポート
- Git Large File Storage
- Git Virtual File System (GVFS)
- Git リポジトリへの SSH アクセスを有効にする
- シークレット スキャン
- Use diff transcoding
- Change the port Bitbucket listens on
- Lockout recovery process
- プロキシとセキュアな Bitbucket
- High availability for Bitbucket
- Diagnostics for third-party apps
- Enabling JMX counters for performance monitoring
- Bitbucket guardrails
- Enable debug logging
- Scaling Bitbucket Data Center
- Add a shortcut link to a repository
- Administer code search
- Adding additional storage for your repository data
- Add a system-wide announcement banner
- アプリケーションを横断したプロジェクト リンクの構成
- レート制限でインスタンスの安定性を改善する
- Atlasssian Data Center アプリケーションで CDN を使用する
- Managing HTTP access tokens
- Manage keys and tokens
- 他のアプリケーションにリンクする
- Setting a system-wide default branch name
- 非アクティブなプル リクエストを自動的に却下
- Secure Bitbucket configuration properties
- データ パイプライン
- アプリケーション パフォーマンスを監視する
関連コンテンツ
- HTTP access tokens
- Managing keys
- How to bypass Verify Committer Hook in Bitbucket Data Center
- How to bypass Verify Committer Hook in Bitbucket Data Center
- An error "You are not permitted to access this resource" appears in Bitbucket Data Center while creating a fork repository into a different project via the API
- Creating projects
- How to renew personal access tokens via REST API's in Bitbucket Server
- OAuth 2.0 provider system properties
- How to allow public access to a repository via the REST API in Bitbucket Server
- Global permissions
Project and repository administrators can create HTTP access tokens for their projects and repositories. Users can create personal HTTP access tokens and use them in place of passwords for Git over HTTPS, or to authenticate when using the Bitbucket Data Center REST API. As an administrator, you can edit and revoke tokens, and set global token settings.
Editing and deleting tokens
As an administrator, you can’t create tokens for users. However, once a user has created a token, you can edit or delete it.
To edit or delete a personal HTTP token:
Go to
> Users.
Search for the user and click on them.
Open the HTTP access tokens tab.
Select Edit or Delete.
To edit or delete a project or repository's HTTP token:
- From either the Project or Repository settings, select HTTP access tokens.
- Select Edit or Delete.
Selecting Edit will allow you to change a token’s name or its permissions. If it has an expiry date, however, you will not be able to modify it. Once a token’s expiry date has been set, it can’t be changed.
Require token expiry
By default, when a user is creating a personal access token, they can choose whether they want it to expire. As a system administrator, for added security you can make setting a token expiry a requirement.
To require token expiry:
Go to
> Keys and tokens (under System).
Select Yes for Automatic expiry.
Enter the HTTP access token expiry (in days).
保存 を選択します。
関連コンテンツ
- HTTP access tokens
- Managing keys
- How to bypass Verify Committer Hook in Bitbucket Data Center
- How to bypass Verify Committer Hook in Bitbucket Data Center
- An error "You are not permitted to access this resource" appears in Bitbucket Data Center while creating a fork repository into a different project via the API
- Creating projects
- How to renew personal access tokens via REST API's in Bitbucket Server
- OAuth 2.0 provider system properties
- How to allow public access to a repository via the REST API in Bitbucket Server
- Global permissions