Skip to main content

Access Keys

In Sumo Logic, you'll need an access key to:

  • Register new Collectors. When you install a collector, in addition to having a role that grants you the Manage Collectors capability, you must supply an access key. You can use a different access key for each collector, or use the same access key for multiple collectors. The only time a collector uses the access key is at installation, so if a key is deleted after a collector has been set up, the collector isn't affected.
  • Use Sumo Logic APIs. You must supply an access key to use the Sumo Logic APIs. See API Authentication for details.
  • Run scripts or automation. Create access keys to provide authentication for scripts or automation.

Prerequisites

Create an access key

From the Personal Access Keys tab

A personal access key is a key that you can create to manage access for personal use.

tip

If you are an administrator who needs to create an access key for system use (such as for API scripts, third party integrations, or infrastructure as code), we recommend you create the access key on a service account.

  1. Classic UI. In the main Sumo Logic menu, select your username and then Preferences > Personal Access Keys.
    New UI. In the top menu select your username, and then under Preferences select Personal Access Keys. You can also click the Go To... menu at the top of the screen and select Personal Access Keys.
  2. On the Personal Access Keys tab, click + Add Access Key.
    Personal Access Keys tab
    The Add New Access Key window appears.
    Add New Access Key screen
  3. Name. Enter a name for your access key.
  4. Allowed CORS Domains (optional). Create an allowlist of domains from which the access key can be used to access Sumo Logic APIs. For more information, see CORS support.
    note

    Enter the domains in the Origin format described in Mozilla help. The URL pattern must include the HTTPS protocol and a domain name. A port is optional.

  5. Scopes. For additional security, you can select scopes to give the key only the permissions you specify.
    note

    The user who will be utilizing the access key needs to have all the same role capabilities as the scopes on the access key. Otherwise, once the user views the access key details, the scopes will be displayed as red in the UI red with a message that the user does not have rights for those scopes.

    Select the scopes for the key:
    • Default. The key has all permissions.
    • Custom. The key has only the specified permissions.
      Access key scopes
      Select the View and Manage permissions that you want the access key to have using the available categories.
      Custom scopes detail
  6. Click Save to generate the key.
  7. IMPORTANT. Copy both the generated Access ID and Access Key before clicking Done. This is the only time you will be able to copy the ID and key.
    Access key successfully created message in Sumo Logic for creating an access key, showing the Access ID and Access Key with options to copy them, and a Done button.
    warning

    After you click Done, you will not be able to recover this Access ID and Access Key.

All personal access keys created in the organization are displayed in the Access Keys tab, described next.

From the Access Keys tab

The Access Keys tab shows all access keys in the system. It provides a central place for administrators to manage access keys.

Administrators can create access keys under Access Keys as an alternative to doing it from the Personal Access Keys tab or from a service account.

  1. Classic UI. In the main Sumo Logic menu, select Administration > Security > Access Keys.
    New UI. In the top menu select Administration, and then under Account Security Settings select Access Keys. You can also click the Go To... menu at the top of the screen and select Access Keys.
  2. At the top right of the table, click + Add Access Key.
    Sumo Logic interface showing a list of access keys with options to add a new access key, search access keys, and statuses of existing keys.
  3. Follow the steps in From the Personal Access Keys tab section above, starting with step 3.

From a Service Account

Administrators can create access keys on a service account for use in scripts or automation. For more information, see Service Accounts.

  1. Classic UI. In the main Sumo Logic menu, select Administration > Security > Service Accounts.
    New UI. In the top menu select Administration, and then under Account Security Settings select Service Accounts. You can also click the Go To... menu at the top of the screen and select Service Accounts.
  2. Select a service account.
  3. Click Add Access Key.
    Add Access Key button on service account details pane
  4. Follow the steps in From the Personal Access Keys tab section above, starting with step 3.

CORS support

Sumo Logic supports cross-origin resource sharing (CORS), a mechanism that uses additional HTTP headers to tell a browser to let a web application running at one origin (domain) have permission to access selected resources from a server at a different origin. When you create an access key, you can optionally define an allowlist of domains that may access Sumo Logic APIs using that access key. 

Whether Sumo Logic accepts or rejects an API request depends on whether it contains an ORIGIN header and the entries in the allowlist. Sumo Logic rejects:

  • Requests with an ORIGIN header but the allowlist is empty.
  • Requests with an ORIGIN header that do not match any entry in the allowlist.

When Sumo Logic rejects a request, it issues an httpErrorCode 403 error. The error key is "forbidden" and the error message is: The request origin is not allowlisted to use this access key.

Sumo Logic accepts:

  • Requests without an ORIGIN header. 
  • Requests with an ORIGIN header that matches an entry in the allowlist.
  • All OPTIONS requests.

When Sumo Logic accepts a request, the response includes the ORIGIN header in an Access-Control-Allow-Origin header.

Edit, activate/deactivate, rotate, or delete access keys

Personal access keys

  1. Classic UI. In the main Sumo Logic menu, select your username and then Preferences > Personal Access Keys.
    New UI. In the top menu select your username, and then under Preferences select Personal Access Keys. You can also click the Go To... menu at the top of the screen and select Personal Access Keys.
  2. Hover your mouse over an access key and click the three-dot icon to reveal the modification options:
    Personal Access Keys tab displaying a list of access keys with options to activate/deactivate, edit, rotate, or delete them.
    • Edit. Opens up a window where you can modify the allowlist for your access key.
    • Activate/Deactivate. Depending on the current status of your access key, you'll see either an Activate or Deactivate option. If you deactivate an access key, Sumo Logic will retain the key credentials, but render the key useless. By default, Sumo Logic will deactivate an access key if it has gone unused for more than 30 days, though the access keys deactivation policy can be updated by a Sumo Logic administrator. You can reactivate a key at any time to begin using it again.
      note

      After an access key is deactivated, there can be a brief period of time during which a previous successful authentication remains cached and a subsequent API request using the deactivated key will succeed. This could occur if the access key was used to authenticate within 15 minutes prior to the key being deactivated.

    • Rotate. Refresh an access key with a new Access ID and Access Key. Copy the new ID and key and use them in all the places where the previous access key was used. (The old key is still usable for 5 minutes after rotation.) Rotate access keys in accordance with your company's rules. By default, access keys are set to never expire after creation or rotation, though the access keys expiration policy can be updated by a Sumo Logic administrator. An access key's expiration date appears in the Expires At column.
    • Delete. Permanently removes the access key. The key will no longer be usable for API calls. However, deleting a key used to register a collector does not affect the collector, since the only time a collector uses the access key is at installation.

Organization access keys

If you have the Manage Access Keys role capability, you can edit, deactivate, and delete any access keys created by other users in your organization.

  1. Classic UI. In the main Sumo Logic menu, select Administration > Security > Access Keys.
    New UI. In the top menu select Administration, and then under Account Security Settings select Access Keys. You can also click the Go To... menu at the top of the screen and select Access Keys.

  2. Hover your mouse over an access key and click the three-dot kebab icon. This reveals the same modification options that appear on the Personal Access Key page, as described above.

Access keys deactivation policy

To enhance the security of your account, Sumo Logic will by default automatically deactivate access keys that haven’t been used for 30 days or more. As an extra security measure, deactivating an access key that has gone unused will ensure that forgotten keys cannot be used later to access your account.

An administrator can adjust the limit to the number of days an Access Key can go unused before being automatically deactivated. To configure this option, you must be a Sumo Logic Administrator or have the Manage organization settings role capability.

To configure the access keys deactivation policy:

  1. Classic UI. In the main Sumo Logic menu, select Administration > Security > Policies.
    New UI. In the top menu select Administration, and then under Account Security Settings select Policies. You can also click the Go To... menu at the top of the screen and select Policies.

  2. Under the Access Keys Deactivation section, select a value in the No. of Days field.
    Access Keys Deactivation settings in Sumo Logic, allowing automatic deactivation of unused or unmodified API access keys after a specified number of days.

    note

    This section is visible to Administrators only.

Access keys expiration policy

By default, access keys are set to never expire. However, an administrator can use the Access Keys Expiration policy to set access keys to expire after a set period. Automatically expiring keys ensures they don't remain in use past your company's access key rotation rules.

An access key's expiration date appears in the Expires At column on the Access Keys tab. You can sort by this column to see when you must rotate keys. To rotate a key, hover your mouse over an access key, click the three-dot kebab icon, and select Rotate. (The old key is still usable for 5 minutes after rotation.) Rotating an access key resets its expiration date according to the number of days in the policy.

An administrator can adjust the time period before access keys expire. To configure this option, you must be a Sumo Logic Administrator or have the Manage organization settings role capability.

To configure the access keys expiration policy:

  1. Classic UI. In the main Sumo Logic menu, select Administration > Security > Policies.
    New UI. In the top menu select Administration, and then under Account Security Settings select Policies. You can also click the Go To... menu at the top of the screen and select Policies.

  2. Under the Access Keys Expiration section, select a value in the Expiration field.
    Access keys expiration settings in Sumo Logic, allowing automatic expiration of API access keys after a specified number of days.

    note

    This section is visible to Administrators only.

    warning

    When you change the policy, all access keys inherit the new policy, and the expiration date for all access keys is reset. For example, if you change the policy to 90 days, then the expiration date is reset on all access keys to 90 days from the date the policy was changed.

Audit logging for access key activity

Access key events are recorded in the Audit Event Index. To search for for access key events, run this query:

_index=sumologic_audit_events _sourceCategory=accessKeys

For more information about audit logging, see Audit Event Index.

Status
Legal
Privacy Statement
Terms of Use

Copyright © 2025 by Sumo Logic, Inc.