Web login
The primary authentication method for web users. nara supports SSO, social login, email/password, and multi-factor authentication. When you log in through the nara web application, the platform handles the entire authentication flow.
nara supports multiple authentication methods depending on how you access the platform:
Web login
The primary authentication method for web users. nara supports SSO, social login, email/password, and multi-factor authentication. When you log in through the nara web application, the platform handles the entire authentication flow.
JWT tokens
JSON Web Tokens are used by the Edge Connector and API clients to authenticate with the platform. JWTs contain claims about the user’s identity and organization membership and are validated on every request.
Server tokens
Long-lived tokens generated from the Settings page for programmatic API access. Server tokens are bound to your organization and can be used in automation scripts, CI/CD pipelines, and third-party integrations.
Server tokens provide programmatic access to the nara API without requiring interactive login. To generate a token:
Navigate to Settings > API & Security.
Click Generate Token.
Give the token a name that describes its purpose (e.g., “CI Pipeline”, “Monitoring Script”, “External Integration”).
Click Create. The token is displayed once — copy it immediately and store it securely.
The token appears in your token list with its name, creation date, and last-used timestamp.
Server tokens are scoped to your organization:
Include the server token in the Authorization header of your HTTP requests:
curl -X GET https://app.nara.de/api/agent/run \ -H "Authorization: Bearer <YOUR_SERVER_TOKEN>" \ -H "Content-Type: application/json"All API endpoints accept Bearer token authentication. The token is validated on every request — if the token is revoked or the organization is deactivated, the request is rejected with a 401 Unauthorized response.
Example: listing runnable functional agents
curl -X GET https://app.nara.de/api/agent/run \ -H "Authorization: Bearer nara_tk_abc123..." \ -H "Content-Type: application/json"Example: triggering a functional agent run
curl -X POST https://app.nara.de/api/agent/run \ -H "Authorization: Bearer nara_tk_abc123..." \ -H "Content-Type: application/json" \ -d '{ "agentName": "summarizeTicket", "args": { "ticketNumber": "1234" } }'Rotate regularly
Generate new tokens periodically and revoke old ones. This limits the window of exposure if a token is compromised. Establish a rotation schedule (e.g., every 90 days) and automate the process where possible.
Never commit to source control
Tokens should never appear in code repositories, configuration files checked into Git, or build artifacts. Use .gitignore to exclude any files that contain tokens.
Use environment variables
Store tokens in environment variables or a secrets manager (e.g., AWS Secrets Manager, HashiCorp Vault, GitHub Secrets) rather than hardcoding them in scripts or configuration files.
Revoke unused tokens
Regularly review your token list under Settings > API & Security. Revoke any tokens that are no longer in use or whose purpose is no longer relevant.
To revoke a server token:
Navigate to Settings > API & Security.
Find the token in the list.
Click Revoke and confirm.
The token is invalidated immediately. Any requests using this token will receive a 401 Unauthorized response.
The Edge Connector uses a specialized desktop authentication flow to obtain JWT tokens without requiring server token management:
The desktop auth flow is a browser-based OAuth flow initiated from the CLI:
This flow is ideal for desktop and on-premises installations where an interactive login is possible.
| Scenario | Recommended auth method |
|---|---|
| Web application login | Web login (automatic) |
| Desktop Edge Connector | Desktop auth flow (browser OAuth) |
| Headless server Edge Connector | Deployment credentials (ID + secret) |
| CI/CD pipelines | Server token |
| Monitoring scripts | Server token |
| Third-party integrations | Server token |
For detailed information about Edge Connector authentication modes, see the Edge Connector Authentication page.