Chapter 1. Introduction to Red Hat Quay OAuth 2.0 tokens
The Red Hat Quay OAuth 2 token system provides a secure, standards-based method for accessing Red Hat Quay’s API and other relevant resources. The OAuth 2 token-based approach provides a secure method for handling authentication and authorization for complex environments. Compared to more traditional API tokens, Red Hat Quay’s OAuth 2 token system offers the following enhancements:
- Standards-based security, which adheres to the OAuth 2.0 protocol.
- Revocable access by way of deleting the application in which the OAuth 2 token exists.
- Fine-grained access control, which allows Red Hat Quay administrators the ability to assign specific permissions to tokens.
- Delegated access, which allows third-party applications and services to act on behalf of a user.
- Future-proofing, which helps ensure that Red Hat Quay remains compatible with other services, platforms, and integrations.
Red Hat Quay primarily supports two types of tokens: OAuth 2 access tokens and robot account tokens. A third token type, an OCI referrers access token, that is required to list OCI referrers of a manifest under a repository, is also available when warranted.
The following chapters provide more details about each token type and how to generate each token type.