Alauda Container Security requires API tokens for system integrations, authentication, and various system functions. You can manage tokens through the Alauda Container Security web interface.
read
permission for the Integration resource, you cannot create a token with write
permission.roxctl central login
command.In the Alauda Container Security portal, go to Platform Configuration > Integrations.
Scroll to the Authentication Tokens category and click API Token.
Click Generate Token.
Enter a name for the token and select a role that provides the required level of access (for example, Continuous Integration or Sensor Creator).
Click Generate.
Important:
Copy the generated token and store it securely. You will not be able to view it again.
API tokens expire one year from the creation date. Alauda Container Security alerts you in the web interface and by sending log messages to Central when a token will expire in less than one week. The log message process runs once an hour. Once a day, the process lists the tokens that are expiring and creates a log message for each one. Log messages are issued once a day and appear in Central logs.
Log message format:
You can change the default settings for the log message process by configuring the following environment variables:
Environment Variable | Default Value | Description |
---|---|---|
ROX_TOKEN_EXPIRATION_NOTIFIER_INTERVAL | 1h | Frequency at which the background process checks and logs expiring tokens. |
ROX_TOKEN_EXPIRATION_NOTIFIER_BACKOFF_INTERVAL | 24h | Frequency at which notifications are issued for expiring tokens. |
ROX_TOKEN_EXPIRATION_DETECTION_WINDOW | 168h | Time period before token expiration that triggers a notification (default: 1 week). |