2019-05-01 21:11:23 +00:00
|
|
|
---
|
2020-09-01 15:14:13 +00:00
|
|
|
layout: commands
|
2020-04-07 18:55:19 +00:00
|
|
|
page_title: 'Commands: ACL Token Update'
|
2020-04-13 18:40:26 +00:00
|
|
|
sidebar_title: update
|
2019-05-01 21:11:23 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Consul ACL Token Update
|
|
|
|
|
|
|
|
Command: `consul acl token update`
|
|
|
|
|
|
|
|
The `acl token update` command will update a token. Some parts of the token like whether the
|
|
|
|
token is local to the datacenter cannot be changed.
|
|
|
|
|
|
|
|
## Usage
|
|
|
|
|
|
|
|
Usage: `consul acl token update [options]`
|
|
|
|
|
|
|
|
#### API Options
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
@include 'http_api_options_client.mdx'
|
2020-04-07 23:56:08 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
@include 'http_api_options_server.mdx'
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
#### Command Options
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-description=<string>` - A description of the token
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-id=<string>` - The Accessor ID of the token to read. It may be specified as a
|
|
|
|
unique ID prefix but will error if the prefix matches multiple token Accessor IDs
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-09-15 02:02:43 +00:00
|
|
|
- `merge-node-identities` - Merge the new node identities with the existing node
|
|
|
|
identities.
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-merge-policies` - Merge the new policies with the existing policies.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-merge-roles` - Merge the new roles with the existing roles.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-merge-service-identities` - Merge the new service identities with the existing service identities.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-meta` - Indicates that token metadata such as the content hash and Raft indices should be
|
|
|
|
shown for each entry.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-09-15 02:02:43 +00:00
|
|
|
- `-node-identity=<value>` - Name of a node identity to use for this role. May
|
|
|
|
be specified multiple times. Format is `NODENAME:DATACENTER`. Added in Consul
|
|
|
|
1.8.1.
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-policy-id=<value>` - ID of a policy to use for this token. May be specified multiple times.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-policy-name=<value>` - Name of a policy to use for this token. May be specified multiple times.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-role-id=<value>` - ID of a role to use for this token. May be specified multiple times.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-role-name=<value>` - Name of a role to use for this token. May be specified multiple times.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-service-identity=<value>` - Name of a service identity to use for this
|
2019-05-01 21:11:23 +00:00
|
|
|
token. May be specified multiple times. Format is the `SERVICENAME` or
|
|
|
|
`SERVICENAME:DATACENTER1,DATACENTER2,...`
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-upgrade-legacy` - Add new polices to a legacy token replacing all existing
|
|
|
|
rules. This will cause the legacy token to behave exactly like a new token
|
|
|
|
but keep the same secret.
|
2020-02-10 14:43:51 +00:00
|
|
|
|
|
|
|
~> When upgrading a legacy token you must ensure that the new policy or policies
|
|
|
|
specified grant equivalent or appropriate access for the existing clients using
|
|
|
|
this token. You can find examples on how to use the parameter in the [legacy
|
|
|
|
token
|
2020-09-01 15:14:13 +00:00
|
|
|
migration](https://learn.hashicorp.com/consul/day-2-agent-authentication/migrate-acl-tokens)
|
|
|
|
guide.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-format={pretty|json}` - Command output format. The default value is `pretty`.
|
2020-03-26 16:03:22 +00:00
|
|
|
|
2019-12-06 16:14:56 +00:00
|
|
|
#### Enterprise Options
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
@include 'http_api_namespace_options.mdx'
|
2019-12-06 16:14:56 +00:00
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
## Examples
|
|
|
|
|
|
|
|
Update the anonymous token:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ consul acl token update -id anonymous -policy-id 06acc
|
|
|
|
Token updated successfully.
|
|
|
|
AccessorID: 00000000-0000-0000-0000-000000000002
|
|
|
|
SecretID: anonymous
|
|
|
|
Description: Anonymous Token
|
|
|
|
Local: false
|
|
|
|
Create Time: 0001-01-01 00:00:00 +0000 UTC
|
|
|
|
Policies:
|
|
|
|
06acc965-df4b-5a99-58cb-3250930c6324 - node-services-read
|
|
|
|
```
|
|
|
|
|
|
|
|
Update a token description and take the policies from the existing token:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ consul acl token update -id 986193 -description "WonderToken" -merge-policies
|
|
|
|
Token updated successfully.
|
|
|
|
AccessorID: 986193b5-e2b5-eb26-6264-b524ea60cc6d
|
|
|
|
SecretID: ec15675e-2999-d789-832e-8c4794daa8d7
|
|
|
|
Description: WonderToken
|
|
|
|
Local: false
|
|
|
|
Create Time: 2018-10-22 15:33:39.01789 -0400 EDT
|
|
|
|
Policies:
|
|
|
|
06acc965-df4b-5a99-58cb-3250930c6324 - node-services-read
|
|
|
|
```
|