Managing user API keys
A federated user or non-federated user can create an API key to use in the CLI or as part of automation to log in as your user identity. You can use the console, CLI, or API to manage your IBM Cloud® API keys by listing your keys, creating keys, updating keys, or deleting keys.
The API key inherits all assigned access for the user identity for which it is created, and the access is not limited to just the account where the API key is created because it inherits any policies that are assigned to the user. So, if the user has access to resources from multiple accounts, then the API key inherits the access from all accounts. Therefore, it is possible that a user's API key can be used to generate a token and access resources that a user has access to outside of the account where the API key was created.
To avoid this, you can enable cross-account restrictions. With cross-account restrictions, you can specify an allowlist of accounts that can access resources in your account. You can also leave the allowlist empty. This way, if a user tries to access resources in your account with an API key that is created in different account, they are denied access For more information, see Managing cross-account restrictions.
Because the API key that is associated with your user identity has all of the access you're entitled to across any account that you are a member of, you must be cautious with how you use your API key. For example, an IBM Cloud service might need to act on behalf of a user or access services that are not IAM-enabled, so the service might request a user API key. In these cases, create an API key that's associated with a functional ID that is assigned the minimum level of access that is required to work with the service.
A functional ID is a user ID created to represent a program, application, or service. The functional ID can be invited to an account and assigned only the access for a particular purpose, such as interacting with a specific resource or application. The functional ID should be granted only the minimum level access in a single account that is needed for the specific function for which it was created.
If you are applying a trusted profile, you can't create a user API key. You can still create and manage all other API keys. For example, service ID API keys. For more information, see FAQs about IAM.
Managing user API keys
To manage the IBM Cloud API keys that are associated with your user identity or the ones that you have access to manage for other users in the account, go to Manage > Access (IAM) > API keys in the IBM Cloud console. On the API keys page, you can create, edit, or delete IBM Cloud API keys for yourself, and you can manage all classic infrastructure API keys for users that you are an ancestor of in the user hierarchy. In addition, if you are the account owner or a user assigned the required access to manage other user's API keys in the account, you can use the View filter to list and manage those API keys too.
Filter Options | Displayed API Keys | Required Access | Allowed Actions |
---|---|---|---|
My IBM Cloud API keys | Your IBM Cloud API keys | No access required | View, create, edit, delete |
All user IBM Cloud API keys | All IBM Cloud API keys created by all users in the account | Administrator role on IAM Identity service | View, edit, and delete |
Creating an API key in the console
As an IBM Cloud user you might want to use an API key when you enable a program or script without distributing your password to the script. A benefit of using an API key is that a user or organization can create several API keys for different programs. The API keys can be deleted independently if compromised without interfering with other API keys or even the user. You can create up to 20 API keys.
To create an API key for your user identity in the UI, complete the following steps:
- In the IBM Cloud console, go to Manage > Access (IAM) > API keys.
- Click Create an IBM Cloud API key.
- Enter a name and description for your API key.
- Click Create.
- Then, click Show to display the API key. Or, click Copy to copy and save it for later, or click Download.
For security reasons, the API key is only available to be copied or downloaded at the time of creation. If the API key is lost, you must create a new API key.
Creating an API key by using the CLI
To create an API key by using the CLI, use the following command:
- Enter
ibmcloud iam api-key-create NAME [-d DESCRIPTION] [-f, --file FILE]
, and specify a name, description, and file for saving your key. See the following example:
ibmcloud iam api-key-create MyKey -d "this is my API key" --file key_file
Creating an API key by using the API
To create an API key, call the IAM Identity Service API as shown in the following example:
curl -X POST 'https://iam.cloud.ibm.com/v1/apikeys' -H 'Authorization: Bearer TOKEN' -H 'Content-Type: application/json' -d '{
"name": "My-apikey",
"description": "my personal key",
"iam_id": "IBMid-123WEREW",
"account_id": "ACCOUNT_ID"
"store_value": false
}'
CreateApiKeyOptions createApiKeyOptions = new CreateApiKeyOptions.Builder()
.name(apiKeyName)
.iamId(iamId)
.description("Example ApiKey")
.build();
Response<ApiKey> response = service.createApiKey(createApiKeyOptions).execute();
ApiKey apiKey = response.getResult();
apikeyId = apiKey.getId();
System.out.println(apiKey.toString());
const params = {
name: apikeyName,
iamId: iamId,
description: 'Example ApiKey',
};
iamIdentityService.createApiKey(params)
.then(res => {
apikeyId = res.result.id
console.log(JSON.stringify(res.result, null, 2));
})
.catch(err => {
console.warn(err);
});
api_key = iam_identity_service.create_api_key(
name=apikey_name,
iam_id=iam_id
).get_result()
apikey_id = api_key['id']
print(json.dumps(api_key, indent=2))
createAPIKeyOptions := iamIdentityService.NewCreateAPIKeyOptions(apikeyName, iamID)
createAPIKeyOptions.SetDescription("Example ApiKey")
apiKey, response, err := iamIdentityService.CreateAPIKey(createAPIKeyOptions)
if err != nil {
panic(err)
}
b, _ := json.MarshalIndent(apiKey, "", " ")
fmt.Println(string(b))
apikeyID = *apiKey.ID
Before you begin
Before you can manage user API keys by using Terraform, make sure that you have completed the following:
- Install the Terraform CLI and configure the IBM Cloud Provider plug-in for Terraform. For more information, see the tutorial for Getting started with Terraform on IBM Cloud®. The plug-in abstracts the IBM Cloud APIs that are used to complete this task.
- Create a Terraform configuration file that is named
main.tf
. In this file, you define resources by using HashiCorp Configuration Language. For more information, see the Terraform documentation.
Creating an API key by using Terraform
Use the following steps to create access groups by using Terraform.
-
Create an argument in your
main.tf
file. The following example creates an access group by using theibm_iam_api_key
resource, wherename
is a unique name to identify the API key.resource "ibm_iam_api_key" "iam_api_key" { name = "test1234" }
The
description
property is only available if a description is provided during API key creation. For more information, see the argument reference details on the Terraform Identity and Access Management (IAM) page. -
After you finish building your configuration file, initialize the Terraform CLI. For more information, see Initializing Working Directories.
terraform init
-
Provision the resources from the
main.tf
file. For more information, see Provisioning Infrastructure with Terraform.-
Run
terraform plan
to generate a Terraform execution plan to preview the proposed actions.terraform plan
-
Run
terraform apply
to create the resources that are defined in the plan.terraform apply
-
Updating an API key in the console
If you want to change the name or the description of an API key, complete the following steps in the UI or CLI.
To edit an API key, complete the following steps:
- In the IBM Cloud console, go to Manage > Access (IAM) > API keys.
- Identify the row of the API key that you want to update, and click the Actions icon > Edit.
- Update the information for your API key.
- Click Apply.
To edit an API key that is not your own, but you have access to manage, go to the API keys page. Then, select the All user IBM Cloud API keys option from the View menu to find the API key.
Updating an API key by using the CLI
To edit an API key by using the CLI, enter the following command:
- Enter
ibmcloud iam api-key-update NAME [-n NAME] [-d DESCRIPTION]
, specifying the old name, new name, and new description for the key. For more information, see the following example:
ibmcloud iam api-key-update MyCurrentName -n MyNewName -d "the new description of my key"
Updating an API key by using the API
To edit an API key by using the API, call the IAM Identity Service API as shown in the following example:
curl -X PUT 'https://iam.cloud.ibm.com/v1/apikeys/APIKEY_UNIQUE_ID' -H 'Authorization: Bearer TOKEN' -H 'If-Match: <value of etag header from GET request>' -H 'Content-Type: application/json' -d '{
"name": "My-apikey",
"description": "my personal key"
}'
UpdateApiKeyOptions updateApiKeyOptions = new UpdateApiKeyOptions.Builder()
.id(apikeyId)
.ifMatch(apikeyEtag)
.description("This is an updated description")
.build();
Response<ApiKey> response = service.updateApiKey(updateApiKeyOptions).execute();
ApiKey apiKey = response.getResult();
System.out.println(apiKey.toString());
const params = {
id: apikeyId,
ifMatch: apikeyEtag,
description: 'This is an updated description',
};
iamIdentityService.updateApiKey(params)
.then(res => {
console.log(JSON.stringify(res.result, null, 2));
})
.catch(err => {
console.warn(err);
});
api_key = iam_identity_service.update_api_key(
id=apikey_id,
if_match=apikey_etag,
description='This is an updated description'
).get_result()
print(json.dumps(api_key, indent=2))
updateAPIKeyOptions := iamIdentityService.NewUpdateAPIKeyOptions(apikeyID, apikeyEtag)
updateAPIKeyOptions.SetDescription("This is an updated description")
apiKey, response, err := iamIdentityService.UpdateAPIKey(updateAPIKeyOptions)
if err != nil {
panic(err)
}
b, _ := json.MarshalIndent(apiKey, "", " ")
fmt.Println(string(b))
Updating an API key by using Terraform
Use the following steps to update an API key by using terraform:
-
In your Terraform configuration
main.tf
file, find the Terraform code that you used to create theiam_api_key
. -
The following example updates and API key by using the
ibm_iam_api_key
resource, wherename
is a unique name to identify the API key.resource "ibm_iam_api_key" "iam_api_key" { name = "test1234" description = "API key for users" }
The
description
property is only available if a description is provided during API key creation. For more information, see the argument reference details on the Terraform Identity and Access Management (IAM) page. -
Provision the resources from the
main.tf
file. For more information, see Provisioning Infrastructure with Terraform.-
Run
terraform plan
to generate a Terraform execution plan to preview the proposed actions.terraform plan
-
Run
terraform apply
to create the resources that are defined in the plan.terraform apply
-
For more information, see the Terraform documentation.
Locking and unlocking an API key in the console
For platform API keys that represent your user identity you can prevent the API key from being deleted by locking it. A locked API key is indicated by the Locked icon .
- In the IBM Cloud console, go to Manage > Access (IAM) > API keys.
- Identify the row of the API key that you want to lock, and click the Actions icon > Lock.
You can unlock your API key at any time to update or remove the API key from your account. Select the API key from the table that you want to unlock and click the Actions icon > Unlock.
Locking and unlocking an API key by using the CLI
For platform API keys that represent your user identity you can prevent the API key from being deleted by locking it. To lock an API key, use the following command:
ibmcloud iam api-key-lock (NAME|UUID) [-f, --force]
Prerequisites: Endpoint, Login
Command options:
- NAME (required)
- Name of the API key to be locked, exclusive with UUID.
- UUID (required)
- UUID of the API key to be locked, exclusive with NAME.
- -f, --force
- Forces lock without confirmation.
Example:
Lock API key test-api-key
ibmcloud iam api-key-lock test-api-key
To unlock an API key, run the following command:
ibmcloud iam api-key-unlock (NAME|UUID) [-f, --force]
Prerequisites: Endpoint, Login
Command options:
- NAME (required)
- Name of the API key to be unlocked, exclusive with UUID.
- UUID (required)
- UUID of the API key to be unlocked, exclusive with NAME.
- -f, --force
- Forces unlock without confirmation.
Example:
Unlock API key test-api-key
ibmcloud iam api-key-unlock test-api-key
Locking and unlocking an API key by using the API
For platform API keys that represent your user identity you can prevent the API key from being deleted by locking it.
Locking an API key by using the API
To lock an API key by using the API, call the IAM Identity Service API as shown in the following example:
curl -X POST 'https://iam.cloud.ibm.com/v1/apikeys/APIKEY_UNIQUE_ID/lock' -H 'Authorization: Bearer TOKEN' -H 'Content-Type: application/json'
LockApiKeyOptions lockApiKeyOptions = new LockApiKeyOptions.Builder()
.id(apikeyId)
.build();
service.lockApiKey(lockApiKeyOptions).execute();
const params = {
id: apikeyId,
};
iamIdentityService.lockApiKey(params)
.then(res => {
console.log(JSON.stringify(res.result, null, 2));
})
.catch(err => {
console.warn(err);
});
lock_api_key(self,
id: str,
**kwargs
) -> DetailedResponse
response = iam_identity_service.lock_api_key(id=apikey_id)
print(response)
lockAPIKeyOptions := iamIdentityService.NewLockAPIKeyOptions(apikeyID)
response, err := iamIdentityService.LockAPIKey(lockAPIKeyOptions)
if err != nil {
panic(err)
}
Unlocking an API key
To unlock an API key by using the API, call the IAM Identity Service API as shown in the following example:
curl -X DELETE 'https://iam.cloud.ibm.com/v1/apikeys/APIKEY_UNIQUE_ID/lock' -H 'Authorization: Bearer TOKEN' -H 'Content-Type: application/json'
UnlockApiKeyOptions unlockApiKeyOptions = new UnlockApiKeyOptions.Builder()
.id(apikeyId)
.build();
service.unlockApiKey(unlockApiKeyOptions).execute();
const params = {
id: apikeyId,
};
iamIdentityService.unlockApiKey(params)
.then(res => {
console.log(JSON.stringify(res.result, null, 2));
})
.catch(err => {
console.warn(err);
});
response = iam_identity_service.unlock_api_key(id=apikey_id)
print(response)
unlockAPIKeyOptions := iamIdentityService.NewUnlockAPIKeyOptions(apikeyID)
response, err := iamIdentityService.UnlockAPIKey(unlockAPIKeyOptions)
if err != nil {
panic(err)
}
Locking and unlocking an API key by using the API
For platform API keys that represent your user identity you can prevent the API key from being deleted by locking it.
Locking an API key by using Terraform
Use the following steps to lock an API key by using Terraform:
-
In your Terraform configuration
main.tf
file, find the Terraform code that you used to create theiam_api_key
. -
The following example updates and API key by using the
ibm_iam_api_key
resource, whereentity_lock
indicates whether the API key is locked for further write operations. The default value isfalse
.resource "ibm_iam_api_key" "iam_api_key" { entity_lock = "true" }
-
Provision the resources from the
main.tf
file. For more information, see Provisioning Infrastructure with Terraform.-
Run
terraform plan
to generate a Terraform execution plan to preview the proposed actions.terraform plan
-
Run
terraform apply
to create the resources that are defined in the plan.terraform apply
-
For more information, see the Terraform documentation.
Deleting an API key
If you are using a key rotation strategy, you might want to delete an older key and replace it with a new key.
To delete an API key, complete the following steps:
- In the IBM Cloud console, go to Manage > Access (IAM) > API keys.
- Identify the row of the API key that you want to delete, and click the Actions icon > Delete.
- Then, confirm the deletion by clicking Delete.
To delete an API key that is not your own, but you have access to manage, go to the API keys page. Then, select the All user IBM Cloud API keys option from the View menu to find the API key.
Deleting an API key by using the CLI
To delete an API key by using the CLI:
Enter ibmcloud iam api-key-delete NAME
, specifying the name of the key to delete.
Deleting an API key by using the API
To delete an API key by using the API, call the IAM Identity Service API as shown in the following example:
curl -X DELETE 'https://iam.cloud.ibm.com/v1/apikeys/APIKEY_UNIQUE_ID' -H 'Authorization: Bearer TOKEN' -H 'Content-Type: application/json'
DeleteApiKeyOptions deleteApiKeyOptions = new DeleteApiKeyOptions.Builder()
.id(apikeyId)
.build();
service.deleteApiKey(deleteApiKeyOptions).execute();
const params = {
id: apikeyId,
};
iamIdentityService.deleteApiKey(params)
.then(res => {
console.log(JSON.stringify(res.result, null, 2));
})
.catch(err => {
console.warn(err);
});
delete_api_key(self,
id: str,
**kwargs
) -> DetailedResponse
response = iam_identity_service.delete_api_key(id=apikey_id)
print(response)
deleteAPIKeyOptions := iamIdentityService.NewDeleteAPIKeyOptions(apikeyID)
response, err := iamIdentityService.DeleteAPIKey(deleteAPIKeyOptions)
if err != nil {
panic(err)
}