Personal Access Tokens
Personal Access Tokens function like passwords for Git over HTTP. They provide secure authentication for pushing and pulling repositories without using your account password.Why use Personal Access Tokens
- Security: Keep your account password separate from Git authentication
- Revocability: Delete compromised tokens without changing your password
- Granular control: Create different tokens for different purposes
- Tracking: See when each token was last used
Creating a Personal Access Token
Name your token
Enter a descriptive name that helps you identify the token’s purpose:
- “Development Machine”
- “CI/CD Pipeline”
- “Production Deployment”
- Minimum 3 characters
- Maximum 50 characters
Generate and copy
Click Generate Token to create your token. The token will be displayed once:Click the copy icon to copy the token to your clipboard.
Using Personal Access Tokens
Authenticating Git operations
When Git prompts for credentials, use your token:The password field should contain your Personal Access Token, not your account password.
Token prefix
All Gitflare Personal Access Tokens start with the prefixgvx_. This helps identify them and prevents accidental exposure:
When tokens are required
Personal Access Tokens are required for: Push operations (all repositories):Managing your tokens
Viewing active tokens
In Settings > Personal Access Tokens, you can see all your active tokens:- Token name
- Token prefix (e.g.,
gvx_abc...) - Creation date
- Last used date
Deleting tokens
To revoke a token:When to delete tokens
Delete tokens when:- You no longer need them
- They may have been compromised
- The device or service using them is no longer in use
- You’re rotating tokens for security
- The token hasn’t been used in a long time
Repository access model
Gitflare’s access control follows a simple ownership model:Public repositories
-
Read access: Anyone (no authentication required)
- View repository files
- View commit history
- View issues
- Clone the repository
- Pull updates
-
Write access: Owner only (requires PAT)
- Push commits
- Create/manage issues (as creator)
- Modify repository settings
Private repositories
- All access: Owner only (requires PAT)
- View repository files
- View commit history
- View issues
- Clone the repository
- Pull updates
- Push commits
- Create/manage issues
- Modify repository settings
Private repositories are only visible to their owner. Other users cannot see them in lists or access them via any URL.
Security best practices
Token management
-
Create purpose-specific tokens
-
Use descriptive names
- Helps you identify tokens later
- Makes it easy to know which token to revoke
-
Rotate tokens regularly
- Create new tokens periodically
- Delete old tokens
- Update services to use new tokens
-
Delete unused tokens
- Check the “Last used” date
- Remove tokens for decommissioned services
- Clean up tokens from old devices
Using tokens safely
Do
- Store in password managers
- Use environment variables
- Revoke compromised tokens immediately
- Create separate tokens per device
- Delete tokens you no longer need
Don't
- Commit tokens to repositories
- Share tokens with others
- Use the same token everywhere
- Store tokens in plain text
- Keep tokens after compromise
Responding to token exposure
If you accidentally expose a token:Using tokens in different environments
Local development
Store tokens using Git credential helpers:CI/CD pipelines
Store tokens as encrypted secrets: GitHub Actions:Server deployments
Use environment variables:Access control limitations
Gitflare currently has the following access control characteristics:- No team access: Repositories can only be accessed by their owner
- No collaborators: You cannot add other users to your repositories
- No fine-grained permissions: Tokens have full access to all your repositories
- No read-only tokens: All tokens can read and write
- No organization support: Only individual user accounts are supported
These limitations reflect Gitflare’s design as a lightweight, personal Git hosting solution. For team collaboration, consider using the platform alongside other collaboration tools.
Next steps
Git operations
Learn how to use your tokens for git operations
Creating repositories
Set up new repositories with proper visibility settings