- The
-tokenflag - The
CONSUL_HTTP_TOKENenvironment variable - The
-token-fileflag - The
CONSUL_HTTP_TOKEN_FILEenvironment variable
c7142d25-a8b1-70ba-f521-189872e92c24. Be sure to substitute your own token.
Never expose your ACL tokens in public repositories or logs. Treat them like passwords.
Quick Comparison
| Method | Configuration | When to Use |
|---|---|---|
-token flag | CLI argument | One-off commands or scripts |
CONSUL_HTTP_TOKEN | Environment variable | Frequent CLI use, avoids repetitive flags |
-token-file flag | File containing token | Centralized token management via file system |
CONSUL_HTTP_TOKEN_FILE | Env var pointing to file | Combine file management with environment configuration |
1. Using the -token Flag
Supply the ACL token directly on the command line with -token.
2. Using the CONSUL_HTTP_TOKEN Environment Variable
Export the token once, then omit the -token flag in subsequent commands:
Using
CONSUL_HTTP_TOKEN is convenient for CI/CD pipelines and local development shells.3. Using the -token-file Flag
Store your token in a file (e.g., token.txt) and point the CLI at it:
4. Using the CONSUL_HTTP_TOKEN_FILE Environment Variable
Combine file-based tokens with environment variables to centralize configuration:
Ensure the token file has restrictive permissions (
chmod 600 token.txt) to prevent unauthorized access.Summary
Consul CLI supports ACL tokens via:-tokenflagCONSUL_HTTP_TOKENenvironment variable-token-fileflagCONSUL_HTTP_TOKEN_FILEenvironment variable