Skip to main content
The Chainloop CLI supports three methods to authenticate with the Chainloop Platform:

User Authentication

  • Purpose: For interactive use and attestations
  • Association: Tied to a user account.
  • Duration: Valid for 24 hours
They can be obtained by running the chainloop auth login command.

Chainloop API tokens

  • Purpose:
    • For non-interactive use (automation) such as CI/CD.
    • To perform attestations
  • Association: Project-scoped or organization-scoped.
  • Features:
    • Customizable expiry and manual revocation.
    • Supports fine-grained ACL for access control.
You can operate on your organization API tokens using the chainloop organization api-token command.
You can manage your API tokens in the API Tokens Section.info
and then they can be used by the CLI by either setting CHAINLOOP_TOKEN environment variable or by using the --token flag, for example

Auto-Revocation of Inactive Tokens

Organization administrators can configure Chainloop to automatically revoke API tokens that have not been used within a defined period. This helps reduce the risk of long-lived, forgotten tokens being misused. A background job runs hourly and checks all active tokens in your organization. A token is considered inactive if:
  • Its last used timestamp is older than the configured threshold, or
  • It has never been used and was created before the threshold.

Enable Auto-Revocation

Navigate to the API Tokens settings page and click the Auto revoke button to configure the inactivity threshold.Auto revoke
This feature is off by default. You must explicitly set a threshold to enable it. The setting is configured per organization.

Disable Auto-Revocation

To turn off auto-revocation, set the threshold to 0 or toggle it off in the Web UI:
chainloop organization update --api-token-max-days-inactive 0

View the Current Setting

To check the current auto-revocation threshold for your organization:
chainloop organization describe
If enabled, the output will include the configured threshold, for example API token auto-revoke after: 90 days inactive.

Keyless OIDC Authentication

In some cases, like in GitLab, you can leverage their CI/CD machine identity to authenticate with Chainloop instead of Chainloop API tokens. More info here
  • Purpose:
    • For non-interactive use (automation) such as CI/CD.
    • To perform attestations
Check the GitLab Keyless Attestations guide for more information.