API Tokens
Learn how to create and manage API tokens for integrations.
What are API Tokens
Understanding programmatic access.
API tokens allow external applications to access VasBox on your behalf. They provide secure, programmatic access without sharing your password.
- • Secure authentication
- • No password sharing
- • Can be revoked anytime
- • Usage tracking
- • Full API access
- • Same permissions as creator
- • All actions logged
When to Use API Tokens
Common use cases for API access.
Connect VasBox to accounting software, CRM systems, or other business tools.
Build custom apps that interact with your VasBox data programmatically.
Set up automated scripts to pull reports and data on a schedule.
Integrate custom POS hardware or software with VasBox for receipt creation.
Creating an API Token
Step-by-step token creation.
Navigate to API Tokens
Go to Admin → API Tokens from your dashboard.
Create New Token
Click Create Token and enter a descriptive name for your token.
Naming Convention
Copy Your Token
Your token is displayed. Copy it immediately and store it securely.
Copy this token now. You won't be able to see it again.
vbx_a1b2c3d4e5f6g7h8i9j0...Important
Store Securely
Store your token in a secure location like a password manager or encrypted configuration file.
Managing Tokens
View and revoke existing tokens.
API Tokens
Revoking Tokens
Revoke a token when it's no longer needed or if you suspect it may have been compromised.
When to Revoke
- • Integration no longer needed
- • Security concern or breach
- • Employee departure
- • Token possibly compromised
What Happens
- • Token becomes invalid immediately
- • API requests using token fail
- • Revocation is logged
- • Cannot be undone
Security Best Practices
Keep your API tokens secure.
Name tokens clearly so you know what they're used for.
Create separate tokens for each integration for easier management.
Regularly review and revoke tokens that are no longer in use.
Never send tokens via email or unencrypted channels.
Create new tokens and revoke old ones periodically for security.
Check "Last used" dates to spot unauthorized access.
Token Security