API Token Scopes Reference

API tokens issued by the Manifest Platform use a scope-based permission model. When you create a token, you select one or more composite scopes — each of which bundles a set of granular ACL permissions that control what the token can do.

Security best practice: Always request only the minimum scopes necessary for your integration. Tokens are limited in duration and should be rotated regularly. Store tokens securely using environment variables (e.g. MANIFEST_API_KEY) rather than hardcoding them.


Authentication

All API requests require a Bearer token in the Authorization header:

Authorization: Bearer <your-api-token>
Content-Type: application/json

Tokens are generated from Settings → Account → API Tokens in the Manifest app.


Composite Scopes

Core Access

Scope NameIdentifierDescriptionGranular Permissions Granted
View all pages and dataview-allAllows read access to all platform data except pages that require additional permissions. Required for all tokens.read:vulnerability, read:user, read:sla, read:sbom-share, read:sbom-request, read:sbom-oss, read:sbom-and-vex, read:product, read:organization-alert, read:license, read:label, read:integration, read:enrichment-setting, read:custom-vulnerability, read:component, read:asset-vdr-report, read:asset-pdf-report, read:asset, read:ai-risk-policy, read:ai-model-inventory, read:ai-model-analysis, read:ai-model

SBOM & Asset Management

Scope NameIdentifierDescriptionGranular Permissions Granted
Manage SBOMs and VEXmanage-sboms-and-vexUpload, enrich, merge, download, and delete SBOMs or VEX documents uploaded by any user in the organization. Also allows setting SBOM active/inactive status.create:sbom-and-vex, delete:sbom-and-vex
Manage assetsmanage-assetsEdit component data, change the active status of assets, and add/remove existing labels from assets.update:asset, update:component
Manage labelsmanage-labelsCreate, apply, and delete labels. Labels can be applied to assets and products.create:label, update:label, delete:label
Import OSSimport-ossImport open source software repositories for analysis and tracking.create:sbom-oss
Share SBOMsshare-sbomShare SBOMs to external consumers via email or the portal (if enabled). Users can also merge and share.create:sbom-share, delete:sbom-share
Request SBOMsrequest-sbomSend emails through Manifest to external customers or vendors requesting them to upload an SBOM.create:sbom-request

Vulnerability Management

Scope NameIdentifierDescriptionGranular Permissions Granted
Triage vulnerabilitiesmanage-vulnerability-triageSet a triage status and scope for a vulnerability on any asset.create:vulnerability-triage, read:vulnerability-triage
Manage custom vulnerabilitiesmanage-custom-vulnerabilitiesAdd and update custom vulnerabilities for the organization's vulnerability database.create:custom-vulnerability, update:custom-vulnerability

Products & Reporting

Scope NameIdentifierDescriptionGranular Permissions Granted
Manage productsmanage-productsModify and delete products, add existing labels, and add/remove existing labels to products.create:product, update:product, delete:product
Export reportsexport-reportsDownload Asset or Vulnerability Reports and VDRs.create:product-vdr-report
Create ticketscreate-ticketsCreate tickets anywhere a ticketing integration is enabled in the application.create:ticket
Manage licensesmanage-licensesView and manage license data for the organization.update:license

AI Risk

Scope NameIdentifierDescriptionGranular Permissions Granted
Manage AI model inventorymanage-ai-model-inventoryView and add AI models to the model inventory.update:ai-model-inventory
Manage AI model requestsmanage-ai-model-requestsView, create, and approve or reject model inventory requests.create:ai-model-request, update:ai-model-request
Manage AI model analysesmanage-ai-model-analysesView and create AI model analyses.create:ai-model-analysis
Manage AI risk policiesmanage-ai-risk-policiesView and modify AI Policies set by the organization.update:ai-risk-policy

Organization Administration

⚠️

Warning: The following scopes grant elevated privileges. Assign only to tokens used by trusted, administrative workflows.

Scope NameIdentifierDescriptionGranular Permissions Granted
Manage settingsmanage-settingsManage all organization-level settings, upload settings, SLAs, alerts, and the sharing portal.update:policy, create:policy
Manage peoplemanage-peopleInvite, edit, and revoke access for other users.create:user, read:user, update:user, delete:user
Manage sub-organizationsmanage-sub-organizationsView, create, edit, and delete sub-organizations under a parent organization. Applicable only for parent orgs.create:sub-organization, read:sub-organization, update:sub-organization, delete:sub-organization

Granular Permission Reference

Each composite scope above maps to one or more granular ACL permissions. Our API documentation lists all available granular permissions, their associated API endpoint, and HTTP method for reference.


Common Integration Patterns

The following scope combinations are recommended for common API use cases:

Use CaseRecommended Scopes
CI/CD SBOM uploadview-all, manage-sboms-and-vex
Read-only vulnerability reportingview-all, export-reports
Custom vulnerability ingestionview-all, manage-custom-vulnerabilities
Vulnerability triage automationview-all, manage-vulnerability-triage
AI model tracking (MAIS plugin)view-all, manage-ai-model-inventory, manage-ai-model-analyses
Full admin / programmatic org managementAll scopes (admin tokens only)

Related Resources