Introducing API Token Authentication for Bitbucket
We are happy to announce we have just released a new member of the API Token authentication family!
Now you can enjoy advanced API token management also in Bitbucket Server and Bitbucket Data Center.
But I thought that Bitbucket already had personal access tokens!

Yes, indeed. Bitbucket ships with personal access tokens so that users can leverage secure access to the Bitbucket REST API.
If you’re used to Bitbucket’s personal access tokens, jumping onto API Token Auth will be quite transparent, because there are important similarities.
Similarities between Bitbucket personal access tokens and resolution’s API tokens for Bitbucket
Similarity 1: Tokens can do what the user can do
For starters, a token will have the same permissions of the user who creates it.
For example, if Mary Smith can fork a repository in project A but not in project B, Mary’s token can be used to fork a repository in project A, but not in project B.
Similarity 2: Token scopes
On top of the user permissions, you can restrict what a token can do even further.
Here’s where the approach differs a bit.
- With resolution’s API Token Authenticator for Bitbucket, you can two types of scopes:
- Read only permits GET, HEAD and OPTIONS requests
- Read & write also permits PUT, POST, DELETE

- From Bitbucket, the permission options are a bit more intricate
Differences between Bitbucket personal tokens and resolution’s tokens for Bitbucket
Beyond the similarities, there are some major differences that can improve the security of Bitbucket and give administrators more options to control who has the rights to connect to the API, and for doing what.
Difference 1: permissions to use and create tokens (also for other users)
In Bitbucket, every user can create an API token for himself, and admins can revoke tokens. Period.
With the API Token Auth permissions, on top of the same base functionality you can decide which groups get to:
- Use tokens
- Create tokens
- Create tokens on behalf of other users (and revoke other user’s tokens).

Bonus Trick: You can also restrict who gets to create read&write tokens with the options above.

Difference 2: Advanced system settings
As with the above, the older brothers of API Token Authenticator for Bitbucket already contained interesting restrictions that give additional security:
- Restrict API Tokens so they are only accepted if coming from specific IP addresses and ranges. This can be used to whitelist connections from authorized cloud vendors like Salesforce and from your own servers.
- when running Bitbucket behind a reverse proxy, admins can adjust the app config so that the client IP address making a request with an API Token is read from a different header. This makes it possible for IP address restrictions to work as intended also in that setting.
- Disable password authentication. If you want your users to stop using their passwords to access the API, this is an interesting option!
What’s coming next?
With this launch, API Token Authentication for Bitbucket has a complete set of functionality that we won’t expand in the short term.
But this can change, we’re always listening to our customers requirements.
What other features would you like to see?
We are highly responsive to the feature requests of our customers. Starting with SAML SSO, those feature requests have been the foundation to build our enterprise user management apps into the market leaders they currently are.
Start your evaluation
- Start your evaluation of API Token Authenticator for Bitbucket now from the Atlassian Marketplace.
- Evaluate API Token Authentication for Jira or API Token Authentication for Confluence
Keep reading
- Learn more about the apps in our documentation!
- Find out about other alternatives to personal access tokens
- Understand why no-code platforms can’t hash your password before they store it