How to manage tokens in wolkvox CRM: Viewing, copying, and deleting
Symptom / Need
Wolkvox CRM users need to understand how to interact with the token table, including viewing, copying, and deleting tokens, to effectively manage their integrations and permissions.
Context / Scenarios
This article is useful for:
- Users who need to manage and understand the information presented in the token table.
- Administrators who need to view, copy, or delete tokens to maintain security and organization.
- Users who want to optimize the use of tokens in their daily operations.
Answer (Solution / Recommendation)
Understanding the Token Table
The token table in Wolkvox CRM provides essential information including:
- Token Name: Unique identifier for each token.
- Token Code: Representation of the token, usually hidden for security.
- Usage Type: Indicates whether the token is “Internal” or “External”.
- Associated Company: Only applicable to external tokens, displays the linked company.
- Daily usage limit: Maximum number of uses allowed per day.
- Number of uses: Number of times the token has been used during the current day.
Type of use
- Internal: Internal: For use in general platform APIs.
- External: For use in specific APIs associated with companies.
Viewing and copying tokens
To ensure security, tokens are hidden by default. However, you can view and copy them whenever necessary:
-
Display a token:
- Click the eye icon (white on a green background) next to the token you want to view. This will display the entire token.
-
Copy a token:
- Click the leaves icon (white on a gray background) to copy the token to your operating system's clipboard. This makes it easier to use in other apps or integrations.
Deleting tokens
To keep your tokens secure and organized, it's important to delete those that are no longer needed:
-
Select the token to delete:
- In the token table, locate the token you want to delete.
-
Delete the token:
- Click the trash can icon (white on a red background) next to the token you want to delete.
- Confirm the action if prompted.
Additional considerations
- Security: Always ensure that viewing and copying tokens is done in a secure environment to prevent unauthorized access.
- Token Management: Token deletion should be done with caution, ensuring that the token is no longer required for any active integrations.