Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 007

Access Token

What is Access Token?

Access TokenShort-lived credential issued by an authorization server that a client presents to an API to access protected resources on a user's or service's behalf.


An access token represents the authorization a resource owner has granted to a client, scoped to specific permissions and audiences. In OAuth 2.0 and OpenID Connect, access tokens may be opaque (validated by introspection) or self-contained JWTs (validated locally by signature). They are typically sent in the Authorization: Bearer header and must travel over TLS. Best practice is short lifetimes (minutes), narrow scopes, audience and issuer validation, and storage outside JavaScript memory where possible. Pair with refresh tokens for renewal, and prefer sender-constrained variants such as DPoP or mTLS-bound tokens for high-value APIs.

Examples

  1. 01

    An OAuth 2.0 access token with scope=read:invoices and exp 15 minutes in the future.

  2. 02

    An opaque token validated through the /introspect endpoint of the authorization server.

Frequently asked questions

What is Access Token?

Short-lived credential issued by an authorization server that a client presents to an API to access protected resources on a user's or service's behalf. It belongs to the Identity & Access category of cybersecurity.

What does Access Token mean?

Short-lived credential issued by an authorization server that a client presents to an API to access protected resources on a user's or service's behalf.

How does Access Token work?

An access token represents the authorization a resource owner has granted to a client, scoped to specific permissions and audiences. In OAuth 2.0 and OpenID Connect, access tokens may be opaque (validated by introspection) or self-contained JWTs (validated locally by signature). They are typically sent in the Authorization: Bearer header and must travel over TLS. Best practice is short lifetimes (minutes), narrow scopes, audience and issuer validation, and storage outside JavaScript memory where possible. Pair with refresh tokens for renewal, and prefer sender-constrained variants such as DPoP or mTLS-bound tokens for high-value APIs.

How do you defend against Access Token?

Defences for Access Token typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms

See also