Skip to main content

Access Tokens

A la Mode

Access Tokens appear in more than one place in Control Center:

  • In Standard Mode: Access Tokens in the main left navigation
  • In Advanced Mode: Advanced Config Menu for the Application selected under Choose an App

Create and manage API tokens and Workstation Installation tokens.

The HYPR Control Center exposes an extensive set of APIs which use access tokens as an authentication and authorization mechanism. API access tokens can be created and revoked by Control Center admin users as described below. Tokens have an expiration period (TTL) of 30 days. The expiration date is reset to the current date+TTL each time you use the token, so if you don't use the token for more than 30 days it will expire and you'll need to generate a new one.

Workstation Installation tokens are used during the installation process for the HYPR Passwordless client.

Token Scope

Every token is bound to a specific RP Application. Any operation within the RP Application and the scope of the token (API or Workstation Installation) is allowed in the presence of a valid token.

API Tokens

The Control Center exposes a set of APIs you can use to perform user management tasks programmatically rather than through the UI. For example, you could create a script that deletes workstation users through an API request rather than through the Control Center. Please see the API documentation for more information.

The APIs use access tokens as an authorization mechanism for your API requests. As an administrator, you’ll need to create an access token through the Control Center then include the token in every API request you submit.

API access tokens can be used in the following cases:

  • API requests for the Workstation user APIs, which require a token of type access-tokenDefaultApp. To create this type of access token, select HYPR Default Workstation Application (HYPRDefaultWorkstationApplication) as the Application during token creation.

  • API requests for the Control Center Admin APIs , which require a token of type CCAdminAccessToken. To create this type of access token, select Control Center Admin (controlCenterAdmin) as the Application during token creation.

  • API requests for Integrations you’ve created through the Integrations section in the Control Center, for example an Okta integration. For this type of access token, the Application you select during token creation is the name you gave the integration when you created it.

Workstation Installation Tokens

Whenever you install the HYPR Passwordless client, either for yourself or for other users, you must provide a Workstation Installation token (also called an endpoint security token). See the HYPR Passwordless client Installation instructions for more information. However, this token is given to you by HYPR after you sign up for the service and should not be changed. You use the same token for all installs. Typically you don’t need to create a token manually for this purpose. However, HYPR Support may occasionally ask you to create one.

Create an Access Token

You can create both types of token in the Access Tokens section in the Control Center.

Standard Mode

  1. Click Access Tokens in the Control Center left navigation pane.

  2. Click Create Token. If no tokens are listed, this button will be in the center of the pane. If tokens are already present in the list, it will appear in the upper right, above the list.

    • Type a display name for the new token in the Name your Token field. Choose a name that will help you identify the token's purpose. It can be any combination of characters and can include spaces.

    • Select an Application for which you need the token.

    • Select a token type. Click Next when finished.




    API Tokens Only

    HYPR Default Web Application (HYPRDefaultApplication) may appear in the list of choices. This Application is created by HYPR to support your instance of HYPR. You typically would not need to create an access token for the HYPR Default Web Application. If you decide to, HYPR Default Web Application only accepts API tokens, not Workstation Installation tokens.

  3. If you made a Workstation Token, skip this step. Assign properties to the token.

    • Token Name: The name assigned to the token in the previous step.

    • Application: The RP Application assigned to the token in the previous step.

    • Token Type: Choose a value from the drop-down to continue.

      • Bearer Token: A token used to access API collections, as with the HYPR Passwordless API. If this type of token is selected, continue to the next step to assign permissions.

      • OAuth2 Client Credentials: Using this option requires a few extra choices:

        • Set the time in seconds that the Access Token will be valid

        • If you are using JSON Web Key Sets (JWKSs), check the box next to Use JWKS endpoint and add a valid URL to connect HYPR to the endpoint

          JWKS Endpoint Behavior

          If the JWKS Endpoint is used:

          • The API client creates the key pair and keeps the private key (HYPR never sees it)

          • It shares its public key via the JWKS endpoint

          • HYPR calls the JWKS endpoint via HTTP GET

          • In the JWKS response, HYPR matches the kid attribute in the JWKS response withe the keyId in the JWT header to locate the public key

          • It then uses the public key to verify the Jave web token (JWT) signature

    • Permission Type: Permissions are grouped into catergories; choose the permissions you wish the token to allow. Click Select all for full permissions; click Clear to start over.







    Once you have assigned Permission Types, click Next.

  4. This step provides the option to capture the Bearer Token or gather the Client ID and Secret from an OAuth token. copy the information presented to a safe location. This is a one-time action; the results are never displayed again beyond this dialog.

    • Bearer token: You have the option to copy the token; clicking Copy Token & Close will transfer the token to the clipboard and close the dialog

    • Oauth token: Copy the Client ID and Client Key values and store them somewhere safe. clicking Copy and Close will transfer both values, labeled, to the clipboard, then close the dialog

  5. The following table displays. It shows the same information for both types of token.



    Field NameDescription
    TokenName of the token
    PermissionsAccess to functions within Control Center.
    Possible Values: App Config | User Mgmt | Authentication | Device Reg | Reporting
    Created ByCreator of the token
    Created OnDate of creation
    Last UsedLast used by the clients for registration/authentication and de-registration
    TypeThe type of token
    Possible Values: API | Workstation Installation
    ExpiresTime left before the token expires (hover for the time). This value resets to 30 days after each use; if not used within 30 days of the last use, it will expire, a new token will need to be issued, and all commands using the expired token will need to be updated with the new one.
    ActionsThe only available action as of this version is to Revoke the token

If you have chosen to create OAuth token credentials, continue to Exchanging OAuth Credentials to Obtain a Token.

Advanced Mode

  1. In the selected RP Application left menu, open Access Tokens.

  2. Click Create Token.

  3. The Create Token dialog opens. Name the token, then Select a Token Type:

    • Workstation Installation Token

    • API Token

    When finished, click Next.

  4. If you made a Workstation Token, skip this step. Assign properties to the token.

    • Token Name: The name assigned to the token in the previous step.

    • Application: The currently selected RP Application.

    • Token Type: Choose a value from the drop-down to continue.

      • Bearer Token: A token used to access API collections, as with the HYPR Passwordless API. If this type of token is selected, continue to the next step to assign permissions.

      • OAuth2 Client Credentials: Using this option requires a few extra choices:

        • Set the time in seconds that the Access Token will be valid

        • If you are using JSON Web Key Sets (JWKSs), check the box next to Use JWKS endpoint and add a valid URL to connect HYPR to a server which provides a set of cryptographic keys in JSON format for verifying JSON Web Tokens (JWTs).

          JWKS Endpoint Behavior

          If the JWKS Endpoint is used:

          • The API client creates the key pair and keeps the private key (HYPR never sees it)

          • It shares its public key via the JWKS endpoint

          • HYPR calls the JWKS endpoint via HTTP GET

          • In the JWKS response, HYPR matches the kid attribute in the JWKS response withe the keyId in the JWT header to locate the public key

          • It then uses the public key to verify the Jave web token (JWT) signature

    • Permission Type: Permissions are grouped into catergories; choose the permissions you wish the token to allow. Click Select all for full permissions; click Clear to start over.







    Once you have assigned Permission Types, click Next.

  5. This step provides the option to capture the Bearer Token or gather the Client ID and Secret from an OAuth token. copy the information presented to a safe location. This is a one-time action; the results are never displayed again beyond this dialog.

    • Bearer token: You have the option to copy the token; clicking Copy Token & Close will transfer the token to the clipboard and close the dialog

    • Oauth token: Copy the Client ID and Client Key values and store them somewhere safe. clicking Copy and Close will transfer both values, labeled, to the clipboard, then close the dialog

  6. The following table displays. Click the appropriate tab to see information for each type of token.



    Field NameDescription
    TokenName of the token
    PermissionsAccess to functions within Control Center.
    Possible Values: App Config | User Mgmt | Authentication | Device Reg | Reporting
    Created ByCreator of the token
    Created OnDate of creation
    Last UsedLast used by the clients for registration/authentication and de-registration
    TypeThe type of token
    Possible Values: Bearer | OAuth
    ExpiresTime left before the token expires. This value resets to 30 days after each use; if not used within 30 days of the last use, it will expire and a new token will need to be issued
    ActionsThe only available action as of this version is to Revoke the token

    Double Vision

    These tokens can also be managed from the Control Center Standard Mode Access Tokens list.

If you have chosen to create OAuth token credentials, continue to Exchanging OAuth Credentials to Obtain a Token.

Exchanging OAuth Credentials to Obtain a Token

This process assumes you have already created OAuth credentials as described under Create an Access Token.

Sign Here

HYPR has provided a signing tool for your convenience. You may use any JWT signing program to accomplish this process, as long as it conforms to convention.

  1. Download jwtsignlib.zip and unzip it. It will contain the following files:

    • JWTCreator.java

    • nimbus-jose-jwt-9.38-rc3.jar

  2. Run the following command to generate the assertion, substituting the client_id and client_private_key values obtained in Create an Access Token:

    java -cp "*" JWTCreator.java "<client id>" "<client private key>"

  3. The resulting JWT will be created in the same folder where JWTCreator.java is stored. The contents will be similar to the following example. For reference, see Microsoft identity platform application authentication certificate credentials.

    {
    "alg": "RS256",
    "typ": "JWT",
    }
    .
    {
    "aud": "https: //login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/token",
    "exp": 1484553341,
    "iss": "97f6a5b7-d745-40b6-94fe-5f77d35c6e45",
    "jti": "22b3cb26-e046-42df-9c96-657bd72c1c81",
    "nbf": 1484592741,
    "sub": "97f6a5b7-d745-40b6-94fe-5f77d35c6e45"
    }
    .
    "eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJoeXBh{...}7GFa8A"
  4. Copy the client_assertion (the long string at the end; in this example, eyJhbG...7GFa8A) and use it to issue a cURL command using the following format:

    PropertyValue
    client_idThe value created in Create an Access Token; in our example, it is hypap-c6de0d3c-bb80-4e4b-a1d1-d2eba23aa94b.
    client_assertion_typeurn:ietf:params:oauth:client-assertion-type:jwt-bearer
    client_assertionThe value taken from the cURL command, above; in our example, it is eyJhbG...7GFa8A.
    grant_typeclient_credentials

    Sample cURL Command
    curl --location 'https://highlandsbank.hypr.com/rp/token/endpoint/exchange/clientcredentials' \
    --header 'Content-Type: application/x-www-form-urlencoded' \
    --data-urlencode 'client_id=hypap-c6de0d3c-bb80-4e4b-a1d1-d2eba23aa94b' \
    --data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \
    --data-urlencode 'client_assertion=eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJoeXBhcC1jNmRlOWQzYy1iYjgwLTTlNGItYTEwMS1kMmViYTIzYWE5NGIiLCJhdWQiOiJodHRwczovL2h5cHIuY29tIiwibmJmIjoxNzE4NjQzODkwLCJpc3MiOiJpeXByLmNvbSIsImV4cCI6MTcxODY0NzQ5MCwiaWF0IjoxNzE4NjQzODkwLCJqdGkiOiJiYmQ4MDMxMS1iYjkzLTQxN2QtYjM2OS0zMXY1MDE3ZjAxMTEifQ.W42CJbZpaH9S3EogzRyZsHsZs64L6dUqml0pJ7BO6PgS7GZ7JE24nGGPNQs3zvVigRmdzsNjX50UdYzF7GFa8A
    ' \
    --data-urlencode 'grant_type=client_credentials'
  5. Copy the access_token value from the response to a safe location, and use it to connect to the HYPR Passwordless API. Success and failure examples are shown here.

    • Success:

      {
      "token_type": "Bearer",
      "expires_in": 3599, // seconds
      "access_token": "eyJ0eXAiOiJKV1QiLCJhbRciOiJSUzI1NiI",
      "scope":"hypr:adapt:readPolicy hypr:cc:applications"
      }

      PropertyValue
      token_typeThe type of token. In this case, it will always be Bearer.
      expires_inThe number of seconds before this token expires, as determined by the value of Expires during Create an Access Token. An expired token will receive a 401/403 response.
      access_tokenThe access token value. Copy and save it for later use.
      scopeA list of affected functions in HYPR.

    • Failure:

      {
      "error": "invalid_scope",
      "error_description": "AADSTS70011: The provided value for the input parameter 'scope' is not valid. The scope https://foo.microsoft.com/.default is not valid.\r\nTrace ID: 255d1aef-8e98-452f-ac51-23d051240864\r\nCorrelation ID: fb3d2015-bc17-4cb9-bb85-30c5cf1aaaa7\r\nTimestamp: 2024-01-09 02:02:12Z",
      }

Use the Access Token

An access token is provided on every request to the HYPR API HTTP endpoint. The request will fail if the token is missing or does not have permissions for the requested operation. The request will also fail if the token has expired, been revoked, or is invalid.

The access token must be sent in the Authorization header using the Bearer schema.

Here is an example of how to pass an access token using the cURL command. In the following example, the access token is 7c839b65-9d28-4037-afc6-993fc5595cbf.

curl https://staging1.gethypr.com/cc/api/stats/authenticator/logins \
-H 'Authorization: Bearer 7c839b65-9d28-4037-afc6-993fc5595cbf'

Revoking an Access Token

When you revoke an API access token, you’ll no longer be able to submit API calls for the entity to which the token applies (for example, an integration). In most cases, you won’t need to revoke access tokens. In some cases, HYPR Support may ask you to perform this task.

Risky Revocation

Avoid revoking a Workstation Installation token unless HYPR Support recommends it. This token is used during the installation process for the HYPR Passwordless client. Although installations you’ve performed already won’t be affected if you revoke the token (the HYPR Passwordless client will run as usual for everybody), you won’t be able to install the HYPR Passwordless client for any new users. See the HYPR Passwordless Installation instructions for details.

To revoke an access token, complete these steps:

Standard Mode

  1. Open Access Tokens in the Control Center left navigation pane.

  2. Locate the access token you want to revoke.

  3. Click Revoke in the Actions column of that token.

  4. In the confirmation dialog, click Revoke Token.

Advanced Mode

  1. Click Access Tokens in the Control Center left navigation pane.

  2. Locate the access token you want to revoke.

  3. Click Revoke in the Actions column of that token.

  4. In the confirmation dialog, click Revoke Access Token.

Access Tokens in HYPR SDK for Java

Example API