[role="xpack"] [[security-api-update-api-key]] === Update API key API ++++ Update API key ++++ [[security-api-update-api-key-request]] ==== {api-request-title} `PUT /_security/api_key/` [[security-api-update-api-key-prereqs]] ==== {api-prereq-title} * To use this API, you must have at least the `manage_own_api_key` cluster privilege. Users can only update API keys that they created or that were granted to them. To update another user's API key, use the <> to submit a request on behalf of another user. IMPORTANT: It's not possible to use an API key as the authentication credential for this API. To update an API key, the owner user's credentials are required. [[security-api-update-api-key-desc]] ==== {api-description-title} Use this API to update API keys created by the <> or <> APIs. If you need to apply the same update to many API keys, you can use <> to reduce overhead. It's not possible to update expired API keys, or API keys that have been invalidated by <>. This API supports updates to an API key's access scope, metadata and expiration. The access scope of an API key is derived from the <> you specify in the request, and a snapshot of the owner user's permissions at the time of the request. The snapshot of the owner's permissions is updated automatically on every call. [IMPORTANT] ==== If you don't specify <> in the request, a call to this API might still change the API key's access scope. This change can occur if the owner user's permissions have changed since the API key was created or last modified. ==== [[security-api-update-api-key-path-params]] ==== {api-path-parms-title} `id`:: (Required, string) The ID of the API key to update. [[security-api-update-api-key-request-body]] ==== {api-request-body-title} You can specify the following parameters in the request body, which is optional. [[security-api-update-api-key-api-key-role-descriptors]] `role_descriptors`:: (Optional, object) The role descriptors to assign to this API key. The API key's effective permissions are an intersection of its assigned privileges and the point in time snapshot of permissions of the owner user. You can assign new privileges by specifying them in this parameter. To remove assigned privileges, you can supply an empty `role_descriptors` parameter, i.e., an empty object `{}`. If an API key has no assigned privileges, it inherits the owner user's full permissions. The snapshot of the owner's permissions is always updated, whether you supply the `role_descriptors` parameter or not. The structure of a role descriptor is the same as the request for the <>. `metadata`:: (Optional, object) Arbitrary metadata that you want to associate with the API key. It supports nested data structure. Within the `metadata` object, top-level keys beginning with `_` are reserved for system usage. When specified, this fully replaces metadata previously associated with the API key. `expiration`:: (Optional, string) Expiration time for the API key. By default, API keys never expire. Can be omitted to leave unchanged. [[security-api-update-api-key-response-body]] ==== {api-response-body-title} `updated`:: (boolean) If `true`, the API key was updated. If `false`, the API key didn't change because no change was detected. [[security-api-update-api-key-example]] ==== {api-examples-title} If you create an API key as follows: [source,console] ------------------------------------------------------------ POST /_security/api_key { "name": "my-api-key", "role_descriptors": { "role-a": { "cluster": ["all"], "indices": [ { "names": ["index-a*"], "privileges": ["read"] } ] } }, "metadata": { "application": "my-application", "environment": { "level": 1, "trusted": true, "tags": ["dev", "staging"] } } } ------------------------------------------------------------ A successful call returns a JSON structure that provides API key information. For example: [source,console-result] -------------------------------------------------- { "id": "VuaCfGcBCdbkQm-e5aOx", "name": "my-api-key", "api_key": "ui2lp2axTNmsyakw9tvNnw", "encoded": "VnVhQ2ZHY0JDZGJrUW0tZTVhT3g6dWkybHAyYXhUTm1zeWFrdzl0dk5udw==" } -------------------------------------------------- // TESTRESPONSE[s/VuaCfGcBCdbkQm-e5aOx/$body.id/] // TESTRESPONSE[s/ui2lp2axTNmsyakw9tvNnw/$body.api_key/] // TESTRESPONSE[s/VnVhQ2ZHY0JDZGJrUW0tZTVhT3g6dWkybHAyYXhUTm1zeWFrdzl0dk5udw==/$body.encoded/] For the examples below, assume that the owner user's permissions are: [[security-api-update-api-key-examples-user-permissions]] [source,js] -------------------------------------------------- { "cluster": ["all"], "indices": [ { "names": ["*"], "privileges": ["all"] } ] } -------------------------------------------------- // NOTCONSOLE The following example updates the API key created above, assigning it new role descriptors and metadata: [source,console] ---- PUT /_security/api_key/VuaCfGcBCdbkQm-e5aOx { "role_descriptors": { "role-a": { "indices": [ { "names": ["*"], "privileges": ["write"] } ] } }, "metadata": { "environment": { "level": 2, "trusted": true, "tags": ["production"] } } } ---- // TEST[s/VuaCfGcBCdbkQm-e5aOx/\${body.id}/] // TEST[continued] A successful call returns a JSON structure indicating that the API key was updated: [source,console-result] ---- { "updated": true } ---- The API key's effective permissions after the update will be the intersection of the supplied role descriptors and the <>: [source,js] -------------------------------------------------- { "indices": [ { "names": ["*"], "privileges": ["write"] } ] } -------------------------------------------------- // NOTCONSOLE The following example removes the API key's previously assigned permissions, making it inherit the owner user's full permissions. [source,console] ---- PUT /_security/api_key/VuaCfGcBCdbkQm-e5aOx { "role_descriptors": {} } ---- // TEST[skip:api key id not available anymore] Which returns the response: [source,console-result] ---- { "updated": true } ---- The API key's effective permissions after the update will be the same as the owner user's: [source,js] -------------------------------------------------- { "cluster": ["all"], "indices": [ { "names": ["*"], "privileges": ["all"] } ] } -------------------------------------------------- // NOTCONSOLE For the next example, assume that the owner user's permissions have changed from <> to: [source,js] -------------------------------------------------- { "cluster": ["manage_security"], "indices": [ { "names": ["*"], "privileges": ["read"] } ] } -------------------------------------------------- // NOTCONSOLE The following request auto-updates the snapshot of the user's permissions associated with the API key: [source,console] ---- PUT /_security/api_key/VuaCfGcBCdbkQm-e5aOx ---- // TEST[skip:api key id not available anymore] Which returns the response: [source,console-result] ---- { "updated": true } ---- Resulting in the following effective permissions for the API key: [source,js] -------------------------------------------------- { "cluster": ["manage_security"], "indices": [ { "names": ["*"], "privileges": ["read"] } ] } -------------------------------------------------- // NOTCONSOLE