Skip to main content

Personal access tokens (PATs)

Personal Access Tokens (PATs) provide secure, scoped access to the Taskurai Data Plane.
They are typically used by:

  • applications that create tasks
  • integrations that query state or logs
  • custom tooling
  • developers for local development and testing

Workers running inside Taskurai do not require PATs.
They receive internal authorization automatically.

warning

PATs grant access to the Taskurai API.
Store them securely and never commit them to source control.

Prerequisites

  • Taskurai installation (Taskurai instance, Taskurai CLI, etc.). See Taskurai Setup.

Access Scopes

Taskurai PATs only support Data Plane scopes.

Valid wildcards:

To include all scopes, user wildcards:

  • Data/Buildby.Taskurai/*

To include all read permissions, use wildcards:

  • Data/Buildby.Taskurai/*/read

Task scopes

ScopeDescription
Data/Buildby.Taskurai/tasks/createCreate tasks
Data/Buildby.Taskurai/tasks/readList or read tasks
Data/Buildby.Taskurai/tasks/updateUpdate tasks
Data/Buildby.Taskurai/tasks/deleteDelete tasks
Data/Buildby.Taskurai/tasks/action/dequeueWorker dequeue access
Data/Buildby.Taskurai/tasks/action/extendExtend task visibility
Data/Buildby.Taskurai/tasks/action/resumeResume waiting tasks

To include all task permissions, use wildcards:

  • Data/Buildby.Taskurai/tasks/*

Events

ScopeDescription
Data/Buildby.Taskurai/events/createPublish/create events

Step scopes

ScopeDescription
Data/Buildby.Taskurai/steps/createCreate orchestration steps
Data/Buildby.Taskurai/steps/readRead/query steps
Data/Buildby.Taskurai/steps/updateUpdate step state
Data/Buildby.Taskurai/steps/deleteDelete steps

To include all step permissions, use wildcards:

  • Data/Buildby.Taskurai/steps/.*

State scopes

ScopeDescription
Data/Buildby.Taskurai/state/createCreate state entries
Data/Buildby.Taskurai/state/readRead/query state
Data/Buildby.Taskurai/state/deleteDelete state

To include all state permissions, use wildcards:

  • Data/Buildby.Taskurai/state/*

Lock scopes

ScopeDescription
Data/Buildby.Taskurai/locks/createCreate locks
Data/Buildby.Taskurai/locks/readRead locks
Data/Buildby.Taskurai/locks/deleteDelete locks

To include all lock permissions, use wildcards:

  • Data/Buildby.Taskurai/locks/*

Sensitive & Secret Data

ScopeDescription
Data/Buildby.Taskurai/sensitive/readRead sensitive data
Data/Buildby.Taskurai/secrets/readRead global secrets

Logging scopes

ScopeDescription
Data/Buildby.Taskurai/logs/query/readQuery logs
Data/Buildby.Taskurai/logs/console/readConsole logs
Data/Buildby.Taskurai/logs/system/readSystem logs
Data/Buildby.Taskurai/logs/tasks/console/readTask console logs
Data/Buildby.Taskurai/logs/tasks/correlation/console/readTask correlation logs
Data/Buildby.Taskurai/logs/commands/console/readCommand logs
Data/Buildby.Taskurai/logs/workers/console/readWorker console logs
Data/Buildby.Taskurai/logs/workers/system/readWorker system logs
Data/Buildby.Taskurai/logs/container-images/console/readContainer image logs

To include all log permissions, use wildcards:

  • Data/Buildby.Taskurai/logs/*

Managing PATs using the CLI

Creating an Access Token

tip

To specify multiple scopes, use the --scopes option multiple times.

To create an access token, use the taskurai pat create command:

taskurai pat create \
--name "mytoken" \
--valid-minutes 43200 \
--scopes "Data/Buildby.Taskurai/tasks/*" \
--scopes "Data/Buildby.Taskurai/logs/*"

Updating an Access Token

To update an existing access token, use the taskurai pat update command:

taskurai pat update --name mytoken --valid-minutes 2500

Showing an Access Token

To view the properties of an existing access token, use the taskurai pat show command:

taskurai pat show --name mytoken
info

Please note that the token value is only returned when creating or updating a token.

Listing Access Tokens

To list all access tokens, use the taskurai pat list command:

taskurai pat list

Removing Access Tokens

To delete an access token, use the taskurai pat delete command:

taskurai pat delete --name mytoken

Alternatively, you can select the PAT(s) from the list using the delete command:

taskurai pat delete

Revoking Access

If you want to revoke access for a specific token, deleting the token will revoke access.
The revocation becomes effective within a 10-20 minute propagation window.

Handling PATs Securely

Local development

For local development in C#, it is recommended to use .NET User Secrets to store and manage secrets. This way, you avoid checking secrets into source control.

Access tokens should be handled with care, as they provide access to the Taskurai API.

Hosted environments

Use secret storage such as:

  • Azure Container Apps → Secrets
  • Azure App Service → Application Settings
  • GitHub Actions → Encrypted Secrets
  • Kubernetes → Secrets