Help Center

| Submit or View Help Requests | Developer Docs |

Progress

View desktop instructions
View mobile app instructions
Scoped Tokens: Best Practices

impact.com allows you to create scoped tokens: API credentials with fine-grained permissions, which grant access to specific API endpoints. Learn more about keeping your tokens secure.

undraw_developer-activity.png

Benefits of scoped tokens

Stronger security

Scoped tokens only allow access to what’s needed, reducing risk if credentials are compromised.

Better access control

Set specific permissions for what each token can do with specific APIs.

Simplify management

Streamline token oversight, especially when working with multiple teams or external partners.

Insightful monitoring

Gain visibility into token usage to better understand API traffic and manage rate limits effectively.

Improved token management

Easily create, manage, and revoke tokens without disrupting other integrations.

Best practices for creating scoped tokens

Follow these best practices to ensure security, clarity, and effective management when creating scoped tokens:

Choose only the APIs and methods you need

Define scopes by selecting only the specific APIs and HTTP methods, like GET, POST, PUT, DELETE that your integration actually requires. If your integration only needs to retrieve data, grant access to the API using only the GET method.

Apply the principle of least privilege

Always start with the minimum level of access needed and only add more permissions if absolutely necessary. Avoid enabling POST, PUT, or DELETE methods unless your integration explicitly requires them.

Use descriptive names and explanations

Give each token a clear, meaningful name, and include a detailed description. This helps your team manage, understand, and audit token usage more effectively.

Assign a responsible technical contact

Make sure each token has a designated technical contact. This person will be responsible for receiving important updates, alerts, or notifications related to API access and integration performance.

Select the correct API version

Ensure the token is aligned with the version of the API your integration is built to use. This helps maintain compatibility and prevents unexpected errors.

Monitor and manage scoped tokens

Check token usage regularly

Make a habit of checking how your tokens are being used. You can do this by setting up a dashboard to track token activity or by asking impact.com for usage details. Also, take note of frequent errors in your integration.

Avoid giving too much access

Tokens that have more permissions than they need can be dangerous if they’re ever exposed. To prevent this, compare what a token is allowed to do with what it’s actually doing. If it has access it doesn’t need, remove it.

Rotate tokens often

Change token credentials regularly to help keep your system safe. Try to update your tokens every few months—once every quarter is a good rule. When you create a new token, make sure to update your integrations to use the new one.

Use clear names and descriptions

Give each token a name and description that explains what the token is for and who owns it. Include details like the app or system using it, its purpose, and whether it’s for testing or live use. Also, assign a person on your team to be the main contact for each token in case of any issues.

Remove tokens you don’t use

Old or unused tokens can create security risks. Plan regular clean-ups—once a month or quarter—to go through all tokens. Delete or disable any tokens that are no longer needed.

Frequently asked questions

Will existing integrations be impacted?

No. Existing integrations using legacy tokens will continue to function. However, we recommend transitioning to scoped API access tokens for improved security and management.

What are legacy tokens?

Legacy tokens are an older type of access token that preceded scoped tokens. Scoped tokens became available on impact.com after May 2025.

How many scoped tokens can I create?

Each account can have up to 20 active scoped tokens. Tokens can be deactivated or deleted as needed.

What happens when a token is deactivated?

Deactivated tokens will be denied access, returning a 403 "Access Denied" response. This allows for temporary suspension without deleting the token.

What if you use an invalid token to access an API?

If you make a request to an API without a valid scoped access token, you will see a 403 “Access Denied” response.

Can you recover a deleted token?

No, the delete functionality permanently deletes the access token and any assigned permissions. If you deleted the token in error, you will be able to create a new token and select the scopes. Existing integrations will need to be updated to use the new access token credentials.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.