Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 088

Bearer Token

What is Bearer Token?

Bearer TokenAn opaque or structured credential (RFC 6750) granting access to a resource simply by possession, without proof that the holder is the rightful owner.


A bearer token is a credential whose use is authenticated by possession alone: anyone who can present the token at the API gains the access it represents. It is most commonly carried in an HTTP Authorization: Bearer header and is defined by RFC 6750 in the context of OAuth 2.0. Because there is no proof-of-possession, bearer tokens must be transported over TLS, stored carefully, scoped narrowly, and given short lifetimes. Stronger alternatives include sender-constrained tokens such as DPoP, mTLS-bound tokens, and Token Binding. Leaked bearer tokens are immediately abusable until revoked or expired.

Examples

  1. 01

    Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...

  2. 02

    Calling https://api.example.com/v1/orders with a leaked OAuth access token.

Frequently asked questions

What is Bearer Token?

An opaque or structured credential (RFC 6750) granting access to a resource simply by possession, without proof that the holder is the rightful owner. It belongs to the Identity & Access category of cybersecurity.

What does Bearer Token mean?

An opaque or structured credential (RFC 6750) granting access to a resource simply by possession, without proof that the holder is the rightful owner.

How does Bearer Token work?

A bearer token is a credential whose use is authenticated by possession alone: anyone who can present the token at the API gains the access it represents. It is most commonly carried in an HTTP Authorization: Bearer header and is defined by RFC 6750 in the context of OAuth 2.0. Because there is no proof-of-possession, bearer tokens must be transported over TLS, stored carefully, scoped narrowly, and given short lifetimes. Stronger alternatives include sender-constrained tokens such as DPoP, mTLS-bound tokens, and Token Binding. Leaked bearer tokens are immediately abusable until revoked or expired.

How do you defend against Bearer Token?

Defences for Bearer Token typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms

See also