Skip to main content

Data Tokens (Vecto)

Data tokens authenticate requests to the Vecto vector storage API. They're separate from Platform API tokens, which authenticate against the platform's GraphQL and REST endpoints.

You create and manage data tokens from the Tokens page in any project.

Token Types

Vecto has three token types, each with different privileges:

OperationPUBLICUSAGEACCOUNT_MANAGEMENT
Lookup datayesyesyes
Ingest datanoyesyes
Edit data and attributesnoyesyes
Management operationsnonoyes
Metrics operationsnonoyes
Create / modify / delete tokensnonoyes
Create / modify / delete vector spacesnonoyes

When to Use Each Type

  • PUBLIC — Lookup-only. Use for public-facing applications where only reads are needed (search UIs, demos, embedded search widgets).
  • USAGE — Read + write within specific vector spaces. Use for application backends that need to ingest and update data but shouldn't manage infrastructure.
  • ACCOUNT_MANAGEMENT — Full control. Use for administrative tools, automation that provisions vector spaces, or any code that manages tokens.

Scoping

  • PUBLIC and USAGE tokens can be scoped to one or more specific vector spaces — pick which spaces the token can access when you create it.
  • ACCOUNT_MANAGEMENT tokens automatically have access to all vector spaces in the project. You can't scope them.

Rule of Thumb

Choose the least privileged token that still does the job.

A leaked PUBLIC token is annoying. A leaked ACCOUNT_MANAGEMENT token can let an attacker delete your entire vector index.

tip

Store tokens in your secret manager, not in source control. Rotate them when team members leave or when you suspect exposure.