API Keys
The Access Tokens page is the lifecycle center for CLI credentials. It is where users create tokens, review their names and prefixes, monitor last-used time, and revoke access cleanly when a machine or workflow should no longer authenticate.
Create
A good API key workflow starts with clear ownership and naming.
Create one token per machine, environment, or automation workflow.
Use names that explain ownership, such as `Local M3 Air`, `Payments staging VM`, or `GitHub Actions smoke test`.
Copy the full token immediately after creation because the product shows it only once.
bash
binboi login --token <new-token>
binboi whoamiReview
The dashboard should help you understand token lifecycle without exposing the full secret again.
| Field | Why it matters | Example |
|---|---|---|
| Name | Helps identify the owner or machine. | `M2 MacBook` |
| Prefix | Safe partial identifier for support and debugging. | `binboi_pat_2e9c4d93` |
| Created time | Useful for cleanup and audit review. | `Mar 30, 2026 21:55` |
| Last used | Helps spot stale or forgotten credentials. | `Apr 1, 2026 09:12` |
| Status | Shows whether the token is active or revoked. | `ACTIVE` |
Revoke
Revocation is the simplest way to recover from token sprawl, machine turnover, or leaked credentials.
Revoke tokens when a machine is retired, reimaged, transferred, or no longer trusted.
Revoke immediately if a token appears in screenshots, shell history, or shared chat logs.
Prefer creating a replacement token rather than trying to keep one credential alive across too many environments.
Safety
The safest token workflow is usually the simplest one.
Do not reuse the same token across every laptop, staging box, and CI runner.
Use the dashboard list to identify old credentials before they become a liability.
Use `binboi whoami` during support or onboarding to verify which account and plan a machine is authenticating as.