Tokens

Create and manage the API tokens that authenticate your MCP clients.

API tokens let your MCP clients authenticate with ASO++. Each token is independent — you can create one per tool, environment, or team member, and revoke any of them without affecting the others.

Creating a token

Open the Tokens page

Click Tokens in the sidebar, then click New token.

Name your token

Give the token a descriptive name that reminds you where it's used — for example, cursor-work, claude-code-laptop, or ci-pipeline.

Token names must be unique within your account and can be up to 64 characters.

Copy your token

After clicking Create, the full token value is displayed once. Copy it immediately and store it somewhere secure — a password manager or your tool's secrets storage.

ASO++ never displays the raw token value again after this screen. If you lose it, revoke the token and create a new one.

Using a token

Tokens authenticate requests as Bearer credentials. When configuring your MCP client, you'll set the token as an environment variable or directly in the configuration. See the MCP setup guides for exact instructions per tool.

Your MCP server URL is:

https://asopp.cc/mcp

Managing existing tokens

The Tokens page lists all your tokens with the following information:

ColumnDescription
NameThe label you chose when creating the token
CreatedWhen the token was created
Last usedWhen the token was last used for a successful call (or "Never")
Statusactive or revoked

Revoking a token

Click the Revoke button next to any token to permanently deactivate it. Any MCP client using that token will immediately start receiving 401 Unauthorized errors.

Revoking a token is permanent. You cannot re-activate a revoked token. Create a new one and update your client configuration.

Token limits

PlanMax active tokens
Free3
Starter10
ProUnlimited

Security practices

  • One token per environment — Use separate tokens for development, staging, and production so you can rotate them independently.
  • One token per tool — If you use Cursor and Claude Code, give each its own token. That way, if one tool is compromised, you only revoke one.
  • Never commit tokens to source control — Use environment variables or a secrets manager.
  • Audit last-used dates— Tokens that haven't been used in 30+ days should be revoked to reduce your attack surface.
  • Quickstart — How to generate your first token and connect a tool
  • Usage — See which token made which calls

© 2026 ASO++. All rights reserved.