Skip to main content

Organization Auth Tokens

Organization Auth Tokens allow access of the organization's resources for automation. They can be accessed and managed by Organization Admins at Admin → Organization Auth Tokens.

note

If your organization enforces SSO, Organization Auth Tokens are the only mechanism that allow to access organization resources through the API. User API Keys will not work.

Creation

Organization Admins can create new tokens via the Create Token button. They will be prompted to enter an optional description. After that, they are shown the token and should store it somewhere safe.

Usage

Organization Auth Tokens can be used with Bearer authentication:

curl -H "Authorization: Bearer $ORGANIZATION_AUTH_TOKEN" https://api.memfault.com/api/v0/organizations/<ORG_SLUG>/projects

Rotating your Organization Auth Token

If your Organization Auth Token is compromised, lost, or needs to be rotated, Organization Admins should first generate a new token from Admin → Organization Auth Tokens, update and verify any integrations using it, and only then delete the old token.

warning

Deleting the old token breaks existing integrations immediately. The old token is invalidated instantly upon deletion - there is no grace period. Any backend services using the old token will begin receiving HTTP 401 Unauthorized responses immediately.

Safe rotation procedure:

  1. Generate a new Organization Auth Token at Admin → Organization Auth Tokens → Create Token
  2. Store the new token in your secret manager
  3. Update and redeploy all backend services to reference the new token
  4. Verify API calls succeed with the new token
  5. Delete the old token via the Delete button on the token list page

Deletion

Organization Admins can delete tokens via the Delete button. Any automation (or user) that uses that token will lose access.