2020-04-07 18:55:19 +00:00
|
|
|
---
|
2020-09-01 15:14:13 +00:00
|
|
|
layout: commands
|
2020-04-07 18:55:19 +00:00
|
|
|
page_title: 'Commands: ACL Set Agent Token'
|
|
|
|
---
|
|
|
|
|
|
|
|
# Consul ACL Set Agent Token
|
|
|
|
|
|
|
|
Command: `consul acl set-agent-token`
|
|
|
|
|
2022-01-11 13:26:58 +00:00
|
|
|
Corresponding HTTP API Endpoint: [\[PUT\] /v1/agent/token/:type](/api-docs/agent#update-acl-tokens)
|
2022-01-10 17:40:11 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
This command updates the ACL tokens currently in use by the agent. It can be used to introduce
|
|
|
|
ACL tokens to the agent for the first time, or to update tokens that were initially loaded from
|
2021-05-31 23:05:47 +00:00
|
|
|
the agent's configuration. Tokens are not persisted unless
|
2022-01-11 01:30:50 +00:00
|
|
|
[`acl.enable_token_persistence`](/docs/agent/config/config-files#acl_enable_token_persistence)
|
2021-05-31 23:05:47 +00:00
|
|
|
is `true`, so tokens will need to be updated again if that option is `false` and
|
|
|
|
the agent is restarted.
|
2020-04-07 18:55:19 +00:00
|
|
|
|
2022-10-18 19:49:07 +00:00
|
|
|
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
2022-03-30 21:16:26 +00:00
|
|
|
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
2022-01-10 21:44:56 +00:00
|
|
|
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
|
|
|
|
|
|
|
| ACL Required |
|
|
|
|
| ------------ |
|
|
|
|
| `acl:write` |
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
## Usage
|
|
|
|
|
2022-07-27 06:17:11 +00:00
|
|
|
Usage: `consul acl set-agent-token [options] token_type token_secret_id`
|
2020-04-07 18:55:19 +00:00
|
|
|
|
2022-07-27 06:17:11 +00:00
|
|
|
The token types are:
|
2020-04-07 18:55:19 +00:00
|
|
|
|
|
|
|
- `default` - The default token is the token that the agent will use for
|
|
|
|
both internal agent operations and operations initiated by the HTTP
|
|
|
|
and DNS interfaces when no specific token is provided. If not set the
|
|
|
|
agent will use the anonymous token.
|
|
|
|
|
|
|
|
- `agent` - The token that the agent will use for internal agent operations.
|
|
|
|
If not given then the default token is used for these operations.
|
|
|
|
|
2021-12-02 17:05:27 +00:00
|
|
|
- `recovery` - This sets the token that can be used to access the Agent APIs
|
|
|
|
in the event that the ACL datacenter cannot be reached. In Consul versions
|
2022-04-12 23:53:26 +00:00
|
|
|
prior to 1.11, this token type was called `agent_master`.
|
2020-04-07 18:55:19 +00:00
|
|
|
|
|
|
|
- `replication` - This is the token that the agent will use for replication
|
|
|
|
operations. This token will need to be configured with read access to
|
|
|
|
whatever data is being replicated.
|
|
|
|
|
2023-01-10 16:24:02 +00:00
|
|
|
- `config_file_service_registration` - This is the token that the agent uses to
|
|
|
|
register services and checks defined in config files. This token needs to be
|
|
|
|
configured with write permissions for the services or checks being registered.
|
|
|
|
If not set, the `default` token is used. If a service or check definition
|
|
|
|
contains a `token` field, then that token is used to register that service or
|
|
|
|
check instead of the `config_file_service_registration` token.
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
### API Options
|
|
|
|
|
|
|
|
@include 'http_api_options_client.mdx'
|
2020-04-07 23:56:08 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
@include 'http_api_options_server.mdx'
|
|
|
|
|
|
|
|
## Examples
|
|
|
|
|
|
|
|
Set the `default` token:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-07 18:55:19 +00:00
|
|
|
$ consul acl set-agent-token default c4d0f8df-3aba-4ab6-a7a0-35b760dc29a1
|
|
|
|
```
|