Token Management

Overview


🔐 Token Management

The Token Management feature allows merchants and partners to generate and manage authentication tokens used for API integrations and SDK operations.

🛡️ Secure Authentication

Tokens are used to securely authenticate requests when integrating with EdfaPay APIs or using SoftPOS SDKs.


Token Types


API Token

Used for server-to-server API integrations and backend system authentication.

SDK Token

Used for SoftPOS and terminal-based operations.

Each token type is managed from specific locations within the dashboard.


API Token Management

📍 Where to Find API Tokens

API tokens are managed from the Settings page.

From the Settings page, users can:

  • Generate a new API token
  • Copy the generated token
  • Disable the API token when it is no longer needed
💼 API Token Usage

The API token is used for:

  • Server-to-server API integrations
  • Backend system integrations
  • Secure authentication when calling EdfaPay APIs

The generated token can be copied and used directly in API requests.

⚡ API Token Actions
ActionDescription
GenerateCreates a new API token
CopyCopies the token for use in integrations
DisableRevokes the token and blocks further usage

SDK Token Management

SDK tokens are used for SoftPOS and terminal-based operations. These tokens are available in multiple locations depending on the user role.

SDK tokens can be found in the Settings page for the following roles:

  • Merchant
  • User
  • Terminal

From this page, users can generate and manage SDK tokens related to their role.


Token Capabilities

Generate Token
Create new authentication tokens for your integrations.
Revoke or Disable
Immediately revoke or disable compromised tokens.
Copy Token
Copy token for usage in your applications.

Access & Permissions

🔒 Access Control
  • Token visibility depends on user role
  • Partners and merchants can manage tokens under their scope
  • Tokens are restricted to authorized users only

Security Notes

⚠️ Security Best Practices
  • Keep tokens confidential - Never expose tokens in public repositories
  • Do not share tokens publicly - Treat tokens like passwords
  • Disable compromised tokens immediately - Act fast if a token is exposed
  • Regenerate tokens when rotating credentials - Regular rotation improves security