Permanently invalidate an API token to stop all requests that use it — for suspected compromise, offboarding, or end-of-project cleanup.
Revoking a token immediately blocks every request that presents it. Use revocation when you need a hard stop: a credential you suspect has been exposed, a service account for a departing employee, or an integration you are decommissioning. Unlike rotation, revocation is permanent — the token cannot be re-activated after it is revoked.
Revocation is irreversible. Once you revoke a token, any service still using it will receive 401 Unauthorized on every request. Create a replacement token before revoking if you need continued access.
A successful revocation returns 204 No Content with an empty body.To confirm the revocation, retrieve the token record with GET /tokens/:id. The response still contains the full token metadata, but the status field reflects the new state:
Tooken retains revoked token records for audit purposes. You can still look up a revoked token by ID and see its full history in the audit log, but no request bearing its secret will be accepted.
If you have webhooks configured, revoking a token triggers a token.revoked event sent to your webhook endpoints. You can use this event to trigger downstream cleanup workflows such as removing the token from a secrets manager.
To revoke multiple tokens at once — for example, all tokens belonging to a specific service — list the tokens by name prefix or scope, then loop through the results and revoke each one.
Before running a bulk revocation in production, log the list of matched tokens to confirm you are targeting the right set. Revocation is permanent and cannot be undone.