You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/terraform-docs-common/docs/cloud-docs/api-docs/organizations.mdx
+5-12Lines changed: 5 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,8 +134,7 @@ curl \
134
134
"owners-team-saml-role-id": null,
135
135
"two-factor-conformant": false,
136
136
"assessments-enforced": false,
137
-
"default-execution-mode": "remote",
138
-
"user-tokens-enabled": true
137
+
"default-execution-mode": "remote"
139
138
},
140
139
"relationships": {
141
140
"default-agent-pool": {
@@ -224,8 +223,7 @@ curl \
224
223
"owners-team-saml-role-id": null,
225
224
"two-factor-conformant": false,
226
225
"assessments-enforced": false,
227
-
"default-execution-mode": "remote",
228
-
"user-tokens-enabled": true
226
+
"default-execution-mode": "remote"
229
227
},
230
228
"relationships": {
231
229
"default-agent-pool": {
@@ -360,8 +358,7 @@ curl \
360
358
"owners-team-saml-role-id": null,
361
359
"two-factor-conformant": false,
362
360
"assessments-enforced": false,
363
-
"default-execution-mode": "remote",
364
-
"user-tokens-enabled": true
361
+
"default-execution-mode": "remote"
365
362
},
366
363
"relationships": {
367
364
"default-agent-pool": {
@@ -433,7 +430,6 @@ Properties without a default value are required.
433
430
|`data.attributes.default-execution-mode`| string |`remote`| Which [execution mode](/terraform/cloud-docs/workspaces/settings#execution-mode) to use by default. Valid values are `remote`, `local`, and `agent`. |
434
431
|`data.attributes.default-agent-pool-id`| string | (previous value) | Required when `default-execution-mode` is set to `agent`. The ID of the agent pool belonging to the organization. Do _not_ specify this value if you set `execution-mode` to `remote` or `local`. |
435
432
|`data.attributes.enforce-hyok`| boolean | false | Whether or not new workspaces within the organization are created with hold your own key enabled. Your organization must have a primary HYOK configuration before enabling `enforce-hyok`. Hold your own key is only available in HCP Terraform, [learn more](/terraform/cloud-docs/hold-your-own-key). |
436
-
|`data.attributes.user-tokens-enabled`| boolean | true | Whether or not user tokens can access an organization's resources through the API. Defaults to `true`. |
437
433
438
434
### Sample Payload
439
435
@@ -516,8 +512,7 @@ curl \
516
512
"owners-team-saml-role-id": null,
517
513
"two-factor-conformant": false,
518
514
"assessments-enforced": false,
519
-
"default-execution-mode": "remote",
520
-
"user-tokens-enabled": true
515
+
"default-execution-mode": "remote"
521
516
},
522
517
"relationships": {
523
518
"default-agent-pool": {
@@ -627,7 +622,6 @@ This PATCH endpoint requires a JSON object with the following properties as a re
627
622
|`data.attributes.default-execution-mode`| string |`remote`| Which [execution mode](/terraform/cloud-docs/workspaces/settings#execution-mode) to use by default. Valid values are `remote`, `local`, and `agent`. |
628
623
|`data.attributes.default-agent-pool-id`| string | (previous value) | Required when `default-execution-mode` is set to `agent`. The ID of the agent pool belonging to the organization. Do _not_ specify this value if you set `execution-mode` to `remote` or `local`. |
629
624
|`data.attributes.enforce-hyok`| boolean | false | Whether or not new workspaces within the organization are created with hold your own key (HYOK) enabled. Your organization must have a primary HYOK configuration before enabling `enforce-hyok`. Hold your own key is only available in HCP Terraform, [learn more](/terraform/cloud-docs/hold-your-own-key). |
630
-
|`data.attributes.user-tokens-enabled`| boolean | true | Whether or not user tokens can access an organization's resources through the API. Defaults to `true`. |
Copy file name to clipboardExpand all lines: content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/api-tokens.mdx
-20Lines changed: 0 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,26 +16,6 @@ Refer to [Team Token API](/terraform/cloud-docs/api-docs/team-tokens) and [Organ
16
16
17
17
API tokens may belong directly to a user. User tokens are the most flexible token type because they inherit permissions from the user they are associated with. For more information on user tokens and how to generate them, see the [Users](/terraform/cloud-docs/users-teams-organizations/users#tokens) documentation.
18
18
19
-
### Disable user tokens for organizations
20
-
21
-
By default, user tokens are enabled for organizations. When your organization disables user tokens, the HCP Terraform API blocks user tokens from accessing organization resources.
22
-
23
-
To disable user tokens for your organization, perform the following steps:
24
-
1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise, then navigate to the organization where you want to disable user tokens.
25
-
1. Choose **Settings** from the sidebar, then **API tokens**.
26
-
1. From the **User Tokens** tab, uncheck the **Allow members to access organization resources with their user tokens** setting.
27
-
1. Click **Update settings**.
28
-
1. In the confirmation modal, select **Disable**.
29
-
1. User tokens are now disabled for this organization.
30
-
31
-
If your organization has automations that authenticate using user tokens, disabling user tokens can cause those automations to fail.
32
-
33
-
<Note>
34
-
35
-
An organization that disables user tokens cannot connect to VCS using the [Github (App)](/terraform/cloud-docs/vcs/github-app), because it relies on user tokens to authenticate. Your organization can use [Github (OAuth) to configure their VCS connections](/terraform/cloud-docs/vcs/github) instead.
36
-
37
-
</Note>
38
-
39
19
## Team API Tokens
40
20
41
21
API tokens may belong to a specific team. Team API tokens allow access to the workspaces that the team has access to, without being tied to any specific user.
0 commit comments