Personal access tokens (PATs) are randomly-generated tokens associated with a user. PATs are used in place of a password to log in to a service.
Enterprise Edition only
Dremio PATs are typically used to log into the system when SSO or LDAP is implemented and REST APIs or ODBC/JDBC are used to access Dremio. In addition to logging in via REST or ODBC/JDC, PATs can also be used to login to the Dremio UI.
PATs can be used to reduce access permissions within a service.
When using PATs with the Dremio REST API, ODBC/JDBC, or UI:
To enable PATS:
auth.personal-access-tokens.enabledkey and click Show.
To create a PAT:
The following screenshot shows a generated PAT for the user, Ruth:
Personal access tokens expire after 90 days by default. To specify a different expiration period, set the
auth.personal-access-token.max_lifetime_dayssupport key to the desired number of days. Only tokens generated after the change are affected.
Each user can delete PATs via the Dremio UI.
To delete your specific PAT:
To delete all of your PATs:
PATs can still exist (depending on the Lifetime setting) in the system after a user is deleted.
If users are deleted from the Dremio environment, SSO, or LDAP, ensure that all of their Personal Access Tokens (PATs) are also deleted. This accomplished via the REST API.