Documentation Index
Fetch the complete documentation index at: https://specterops-bed-7559-api-key-exp.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
| API token type | Description |
|---|---|
| Personal API tokens | Created by individual users for API access. |
| Non-personal API tokens | Created for integrations such as Splunk, ServiceNow, and Cortex XSOAR. |
| Collector client API tokens | Created for AzureHound, SharpHound, and OpenHound data collectors. |
Before you begin
This is a SpecterOps-managed feature. If it is not enabled in your environment, contact your account team for assistance.
- API key expiration is not enabled by default and must be turned on by a user with the Administrator role in BloodHound.
- Only users with the Administrator role can configure API key expiration.
- After enabling API key expiration, all existing and new API keys will be set to expire based on the configured rotation period.
- BloodHound does not send API key expiration notifications.
- Organizations should plan manual key rotation and internal expiration notifications for all integrations and collector clients before changing this setting.
Configure
The following table summarizes how API key expiration settings and actions affect API tokens:| Setting or action | Behavior |
|---|---|
| Feature enabled | Existing and new tokens expire according to the current default or custom rotation period. |
| Default rotation period | Tokens expire after 90 days by default. |
| Custom rotation period | Tokens expire after the configured number of days (between 1 and 365). |
| Rotation period changes | Tokens that expire sooner than the new period keep their current expiration date. Tokens that expire later are reset to expire after the new period, starting from when you save the change. |
| Feature disabled | Expiration enforcement stops immediately, expiration dates are cleared, and tokens no longer expire. |
Navigate to the configuration
- Log in to BloodHound as a user with the Administrator role.
- In the left menu, click Administration > BloodHound Configuration.
Set the rotation period for API keys
Enter the number of days (between 1 and 365) for API keys to remain valid.This value applies to existing and new keys.
Rotate keys
After API key expiration is enabled, Administrators must manually rotate keys before they expire to maintain uninterrupted access to the BloodHound API. This involves regenerating API tokens and updating any integrations or collector clients that use the expiring keys with the new credentials. Administrators can monitor expiration dates in the Manage Clients page for collector clients and in the API Key Management page for personal and non-personal API tokens.Personal/non-personal API tokens
Administrators can rotate personal and non-personal API tokens for all users from the Manage Users page.Users can also rotate their own personal API tokens from the API Key Management page in their profile settings.
Navigate to Manage Users
- Log in to your BloodHound tenant as a user with the Administrator role.
- In the left menu, click Administration > Manage Users.
Regenerate an API token
- Find the user account associated with the expiring API token.
-
Click the hamburger menu and select Generate / Revoke API Tokens.

- Click Create Token, give it a descriptive name, and click Save.
- Save the API token and token ID in a secure location (for example, a secrets manager or enterprise password vault) and click Close.
- Update the dependent integration configuration with the new API token and token ID.
Collector client API tokens
Administrators can rotate API tokens for collector clients from the Manage Clients page.Navigate to Manage Clients
- Log in to your BloodHound tenant as a user with the Administrator role.
- In the left menu, click Administration > Manage Clients.
Regenerate an API token
- Find the collector client associated with the expiring API token.
-
Click the hamburger menu and select Regenerate Auth.

- Confirm the modal that appears, which explains that regenerating authentication invalidates the current client credentials.
- Save the API token and token ID in a secure location (for example, a secrets manager or enterprise password vault). Do not store these values in cleartext files. Then click Close.
- Update the dependent AzureHound, SharpHound, or OpenHound configuration with the new API token and token ID.
