Favicon

You are here: Home > App Distribution > API > App API Token

App API Token

Learn how to create, use, and manage Applivery API tokens for secure integration with CI/CD pipelines and other services. Secure your Applivery apps now!

5 min read

TL;DR

Use Applivery API tokens to securely integrate your apps with CI/CD pipelines and other services by creating, managing, and securely storing these per-app Bearer tokens.

The Applivery Apps API (Integrations API) uses Bearer token authentication. To interact with the API programmatically — whether to upload builds, query build details, integrate with a CI/CD pipeline, or embed the Applivery SDK in your app — you need an App API Token scoped to the specific app you want to work with.

Each app in Applivery can have multiple tokens, which makes it easy to issue separate credentials for different integrations (e.g., one token for Bitrise, another for Fastlane, another for a local script) and revoke them independently without affecting other workflows.


How App API Tokens Work

  • Tokens are per-app — a token created for one app cannot be used to access a different app.

  • Each app can have multiple tokens simultaneously, with no enforced limit.

  • Tokens are Bearer tokens — they must be included in the Authorization header of every API request.

  • Tokens do not expire automatically. They remain valid until explicitly deleted.

  • Deleting a token immediately and permanently invalidates it. There is no way to restore a deleted token.


Creating an App API Token

1
Open the App Settings

Once in the Applivery Dashboard, select the app you want to generate a token for. Navigate to the Settings tab, then select API Tokens from the left-hand menu.

2
Create the token

Click + Create API token. Enter a descriptive name that clearly identifies the integration or system that will use this token — for example:

  • Bitrise CI

  • Fastlane release

  • Azure DevOps pipeline

  • Local upload script

A meaningful name makes it much easier to identify and revoke the right token later, especially when managing multiple integrations.

create api token

Click Save. The token will appear in the list.

3
Copy the token

Click the copy icon next to the newly created token to copy the Bearer token string to your clipboard.

Warning

Store the token securely. Treat it like a password — do not commit it to version control, embed it in client-side code, or share it in plain text. Use environment variables or a secrets manager in your CI/CD pipeline to inject the token at runtime.


Using the Token in API Requests

Include the token in the Authorization header of every request using the Bearer scheme:

Authorization: Bearer YOUR_APP_TOKEN

Example — uploading a build with curl:

curl -X POST https://upload.applivery.io/v1/integrations/builds \
  -H "Authorization: Bearer YOUR_APP_TOKEN" \
  -F "file=@/path/to/your/app.ipa"

Example — listing builds:

curl -X GET https://api.applivery.io/v1/integrations/builds/ \
  -H "Authorization: Bearer YOUR_APP_TOKEN"

For the full list of available endpoints and request parameters, see the API Reference.


Revoking a Token

You can revoke a token at any time by deleting it. This immediately invalidates the token — any system or integration using it will stop working instantly.

Caution

Deleting a token is permanent and cannot be undone. Once deleted, the token cannot be restored. Any integration relying on it must be updated with a new token before it can function again.

To delete a token:

  1. Go to Settings > API Tokens for the relevant app.

  2. Click the three vertical dots next to the token you want to remove, then select Delete from the menu.

  3. Confirm the action when prompted.


Best Practices

  • One token per integration. Issue a separate token for each system or pipeline that needs API access. This means you can revoke a single integration's access without disrupting others.

  • Use descriptive names. Name tokens after the system or workflow that uses them (Fastlane release, Bitrise staging) so you can immediately identify what a token is used for when you need to revoke it.

  • Store tokens as secrets. Never hardcode tokens in source code or configuration files committed to version control. Use your CI/CD platform's secrets management (e.g. Bitrise Secrets, GitHub Actions Secrets, Azure Key Vault) to inject tokens at runtime.

  • Rotate tokens periodically. Even though tokens do not expire automatically, it is good practice to rotate them periodically — especially after team member changes or security incidents. Create the new token, update your integrations, then delete the old one.

  • Audit your token list regularly. Remove tokens that are no longer in use to reduce your attack surface. If you are unsure whether a token is still active, create a replacement, migrate the integration, and then delete the old one.

Key Takeaways

  • Applivery API tokens are per-app and used for secure API access.
  • Tokens should be stored securely and never hardcoded in code.
  • It's best practice to create separate tokens for each integration.
  • Deleting a token is permanent and immediately invalidates it.
  • Regularly audit and rotate tokens to maintain security.