Personal access tokens (PATs) are randomly-generated tokens associated with a user. PATs are used in place of a password to log in to a service.
Enterprise Edition only
Dremio PATs are typically used to log into the system when SSO or LDAP is implemented and REST APIs or ODBC/JDBC are used to access Dremio. In addition to logging in via REST or ODBC/JDC, PATs can also be used to login to the Dremio UI.
PATs can be used to reduce access permissions within a service.
When using PATs with the Dremio REST API, ODBC/JDBC, or UI:
To enable personal access tokens:
auth.personal-access-tokens.enabledand then click Show.
To create a PAT:
If the Personal Access Tokens tab is not visible, try refreshing the page via your browser.
Personal access tokens expire after 90 days by default. To specify a different expiration period, change the value of the
auth.personal-access-token.max_lifetime_dayssupport key. Values greater than 36525 cause tokens to expire immediately. Changes to the value do not affect existing tokens.
Each user can delete PATs via the Dremio UI.
To delete your specific PAT:
To delete all of your PATs:
PATs can still exist (depending on the Lifetime setting) in the system after a user is deleted.
If users are deleted from the Dremio environment, SSO, or LDAP, ensure that all of their Personal Access Tokens (PATs) are also deleted. This accomplished via the REST API.