User auth tokens
User auth tokens are tied to your personal Sentry account. Any API call made with a user auth token acts with the same permissions you have in Sentry.Creating a user auth token
Open auth token settings
Go to Settings > Auth Tokens in the Sentry web UI, or navigate directly to sentry.io/settings/auth-tokens/.
Create a new token
Click Create New Token. Give the token a descriptive name so you can identify it later.
Select scopes
Choose the minimum scopes your integration needs. You cannot add scopes to a token after it is created.
sntryu_.
Internal integration tokens
Internal integration tokens are scoped to an organization rather than a personal account. They are ideal for automated workflows, CI/CD pipelines, and server-to-server integrations that should not depend on any individual user’s account.Creating an internal integration token
Open integrations settings
Go to Settings > Developer Settings > Internal Integrations for your organization.
Configure permissions
Set the permissions (scopes) the integration requires. These are equivalent to the token scopes described below.
Install the integration
Save the integration. Sentry generates a token automatically on installation.
Token scopes
Each token is granted one or more scopes. A token can only perform operations allowed by its scopes.| Scope | What it allows |
|---|---|
org:read | List organizations, view members, and read organization settings |
org:write | Update organization settings and configuration |
org:admin | Full organization administration, including deletion |
project:read | View projects and their configuration |
project:write | Create projects and update their settings |
project:admin | Delete projects and manage DSN keys |
project:releases | Create releases, upload source maps, and create deploys |
team:read | View teams and team membership |
team:write | Create teams and add or remove members |
team:admin | Delete teams |
event:read | View issues and raw events |
event:write | Update issue status, assignee, and other attributes |
event:admin | Delete issues and events |
member:read | View organization members and their roles |
member:write | Invite members and change member roles |
alerts:read | View alert rules |
alerts:write | Create, update, and delete alert rules |
Revoking tokens
User auth tokens: Go to Settings > Auth Tokens, find the token, and click Revoke. Internal integration tokens: Go to Settings > Developer Settings > Internal Integrations, open the integration, and revoke or rotate the token from there. Revoking a token immediately invalidates it. Any API call using a revoked token receives a401 Unauthorized response.
Security best practices
- Store tokens in environment variables or a secrets manager (such as AWS Secrets Manager, HashiCorp Vault, or GitHub Actions secrets).
- Grant the minimum scopes required — avoid using
org:adminwhenorg:readis sufficient. - Use internal integration tokens for automation rather than personal user auth tokens, so access is not tied to any one person’s account.
- Rotate tokens periodically and after team member offboarding.
- Audit active tokens regularly in Settings > Auth Tokens and remove any that are no longer needed.