Managing Tokens
This section covers the following token operations:
| • | Creating a Token |
| • | Verifying a Token |
| • | Rotating a Token |
| • | Deleting a Token |
| • | Getting Token Details |
| • | Updating a Token |
| • | Listing Non-Expired Tokens |
| • | Getting the Count of Non-Expired Tokens |
| • | Searching for Tokens |
Important:To perform any of the above mentioned tasks for IMPERSONATED tokens, users require the Create Impersonated Token permission and a Manage Users permission (see Permissions for access-token-controller).