You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## WHAT
Improvements to token creation steps:
* Moved the "Expiration" field step to later in the process and updated
its description to clarify that users can select from predefined options
or specify a custom expiration date, with an added note about the
minimum date requirement.
* Reordered and renumbered the steps for configuring allowed IP ranges,
package/scope access, and organization access for better logical flow
and clarity.
## WHERE
Modified on: https://docs.npmjs.com/creating-and-viewing-access-tokens
Copy file name to clipboardExpand all lines: content/integrations/integrating-npm-with-external-services/creating-and-viewing-access-tokens.mdx
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ You can [create](#creating-access-tokens) and [view](#viewing-access-tokens) acc
14
14
15
15
<Screenshotsrc="/integrations/integrating-npm-with-external-services/tokens-profile.png"alt="Screenshot of the account menu with the tokens link selected" />
16
16
17
-
2. Click **Generate New Token**, then click **Granular Access Token**.
17
+
2. Click **Generate New Token**.
18
18
19
19
<Screenshotsrc="/integrations/integrating-npm-with-external-services/create-token.png"alt="Screenshot of the create new token button" />
20
20
@@ -26,28 +26,30 @@ You can [create](#creating-access-tokens) and [view](#viewing-access-tokens) acc
26
26
- This setting is unchecked (false) by default
27
27
- By checking this box, the token will bypass 2FA for write actions even if 2FA is enabled at the account or package level
28
28
29
-
6. In the **Expiration** field, enter a token expiration period. The date must be at least 1 day in the future.
30
-
31
-
7. (Optional) In the **Allowed IP Ranges** field, enter IP address ranges to restrict your access token to. You must use [CIDR][cidr-wiki] notation to enter IP address ranges. To add more than one allowed IP range, click **Add IP Range** and enter an IP range in the new text field.
29
+
6. (Optional) In the **Allowed IP Ranges** field, enter IP address ranges to restrict your access token to. You must use [CIDR][cidr-wiki] notation to enter IP address ranges. To add more than one allowed IP range, click **Add IP Range** and enter an IP range in the new text field.
32
30
33
31
<Screenshotsrc="/integrations/integrating-npm-with-external-services/granular-access-token-ip-range.png"alt="Screenshot of the allowed IP ranges section" />
34
32
35
-
8. (Optional) In the **Packages and scopes** section, configure your token's access to packages and scopes.
33
+
7. (Optional) In the **Packages and scopes** section, configure your token's access to packages and scopes.
36
34
- In the **Permissions** dropdown menu, select **No access**, **Read-only**, or **Read and write**.
37
35
- Under **Select Packages**, select either:
38
36
-**All Packages** to grant the token access to all packages the user account has access to.
39
37
-**Only select packages and scopes** to choose up to 50 specific packages or scopes to give the token access to. Then select specific packages or scopes from the dropdown menu.
40
38
41
39
<Screenshotsrc="/integrations/integrating-npm-with-external-services/granular-access-token-packages-scopes.png"alt="Screenshot of the packages and scopes section" />
42
40
43
-
9. (Optional) In the **Organizations** section, configure your token's access to organizations.
41
+
8. (Optional) In the **Organizations** section, configure your token's access to organizations.
44
42
- In the **Permissions** dropdown menu, select **No access**, **Read-only**, or **Read and write**.
45
43
- Under **Select organizations**, select the organizations you want to grant your token access to.
46
44
47
45
<Screenshotsrc="/integrations/integrating-npm-with-external-services/granular-access-token-organizations.png"alt="Screenshot of the organizations section" />
48
46
49
47
_**Note**: When you give a token access to an organization, the token can only be used for managing organization settings and teams or users associated with the organization. It does not give the token the right to publish packages managed by the organization._
50
48
49
+
9. In the **Expiration** field, select a token expiration period from the dropdown menu. You can choose from predefined options or select Custom to specify a custom expiration date using the date picker.
50
+
51
+
_**Note**: The date must be at least 1 day in the future._
52
+
51
53
10. Review the token summary, then click **Generate Token**.
52
54
53
55
<Screenshotsrc="/integrations/integrating-npm-with-external-services/granular-access-token-summary.png"alt="Screenshot of the granular access token summary and the generate token button" />
0 commit comments