Managing Tokens
This section covers the following token operations:
| • | Creating a Token | 
| • | Verifying a Token | 
| • | Rotating a Token | 
| • | Deleting a Token | 
| • | Getting Token Details | 
| • | Updating a Token | 
| • | Listing Non-Expired Tokens | 
| • | Getting the Count of Non-Expired Tokens | 
| • | Searching for Tokens | 
Important:To perform any of the above mentioned tasks for IMPERSONATED tokens, users require the Create Impersonated Token permission and a Manage Users permission (see Permissions for access-token-controller).