Personal access tokens (PATs) are user-scoped bearer tokens. A PAT belongs to one Notion user in one workspace, and it uses that user’s workspace membership and page permissions when it calls the Notion API. PATs are useful when you want to authenticate as yourself without creating an internal connection or implementing the OAuth flow for a public connection.Documentation Index
Fetch the complete documentation index at: https://developers.notion.com/llms.txt
Use this file to discover all available pages before exploring further.
When to use a PAT
Use a PAT for personal or developer-owned workflows where one Notion user is the right security boundary:- Local scripts, notebooks, and command-line tools that automate work in your own workspace.
- Development and testing against the Notion API before you create a shared connection.
- Third-party tools that ask you to paste a Notion token and should act with your Notion permissions.
- Notion Workers development and deployment with the Notion CLI.
How PATs work
A PAT is created in the Developer portal. When you create one, you choose:- A token name.
- The workspace the token belongs to.
- Capabilities for the token.
| Capability | What it allows |
|---|---|
| Notion API | Read, create, update, and search content; read and create comments; and read supported user information through Notion’s REST API. |
| Workers | Deploy and manage Notion Workers with the Notion CLI. |
Permissions and content access
A PAT acts as the user who created it:- It can access pages, data sources, databases, comments, files, and other resources that the creator can access.
- It does not need pages to be shared with a bot through Add connections.
- If the creator loses access to a page or leaves the workspace, the PAT loses that access too.
- API behavior that depends on an authenticated user, such as
"me"filters or workspace-level private page creation, uses the PAT creator.
List all users is not available to PATs. A PAT can use Retrieve token’s bot user to retrieve the authorized user, and Retrieve a user can retrieve that same user.
Workspace admin controls
Workspace admins can manage PATs from Settings & members → Connections:- View all PATs created in the workspace, including active and revoked tokens.
- Search and filter tokens by name, creator, and status.
- See who created a token and, for revoked tokens, who revoked it.
- Revoke active PATs.
- Configure who can create PATs with Notion API access.
unauthorized error until the policy allows the member again or the member uses a different valid token.
Who can create PATs
Guests and restricted members cannot create PATs or log in with the Notion CLI (ntn login). Only full workspace members can create tokens, subject to the workspace’s PAT creation policy below. Workspace owners can always create PATs with Notion API access.
| Plan | Default PAT creation policy | Admin controls |
|---|---|---|
| Free | Workspace owners only. | Not configurable. |
| Plus | All workspace members. | Not configurable. |
| Business | Workspace owners only. | Admins can choose Workspace owners only or All workspace members. |
| Enterprise | Workspace owners and selected groups. | Admins can choose Workspace owners only, Workspace owners and selected groups, or All workspace members. |
Create a PAT
Open the Developer portal.
Go to Personal access tokens.
Revoke a PAT
Revoke a PAT immediately if it is exposed, no longer needed, or associated with a tool you no longer trust.- Token creators can revoke their own PATs from the Developer portal.
- Workspace admins can revoke any PAT in their workspace from Settings & members → Connections → All personal access tokens.
Security best practices
Treat PATs like passwords:- Store PATs in environment variables or a secret manager.
- Do not commit PATs to source control.
- Use a separate PAT per script, tool, or environment so you can revoke one token without breaking unrelated workflows.
- Grant only the capabilities the workflow needs.
- Revoke tokens you no longer use.