User Access Tokens are the preferred way to authenticate an application or notebook to Hugging Face services. You can manage your access tokens in your settings.
Access tokens allow applications and notebooks to perform specific actions specified by the scope of the roles shown in the following:
read: tokens with this role can only be used to provide read access to repositories you could read. That includes public repositories and private repositories that you, or an organization you're a member of, own. Use this role if you only need to read content from the Hugging Face Hub (e.g. when downloading private models or doing inference).
write: tokens with this role additionally grant write access to the repositories you have write access to. Use this token if you need to create or push content to a repository (e.g., when training a model or modifying a model card).
To create an access token, go to your settings, then click on the "Access Tokens" tab. Click on the "New token" button to create a new User Access Token.
Select a role and a name for your token and voilà - you're ready to go!
You can delete and refresh User Access Tokens by clicking on the "Manage" button.
There are plenty of ways to use a User Access Token to access the Hugging Face Hub, granting you the flexibility you need to build awesome apps on top of it.
- User Access Tokens can be used in place of a password to access the Hugging Face Hub with git or with basic authentication
- User Access Tokens can be passed as a bearer token when calling the Inference API.
- User Access Tokens can be used in the Hugging Face Python libraries, such as
from transformers import AutoModel access_token = "hf_..." model = AutoModel.from_pretrained("private/model", use_auth_token=access_token)
⚠️ Try not to leak your token! Though you can always rotate it, anyone will be able to read or write your private repos in the meantime which is 💩
We recommend you create one access token per app or usage. For instance, you could have a separate token for:
- A local machine.
- A Colab notebook.
- An awesome custom inference server.
This way, you can invalidate one token without impacting your other usages.
We also recommend only giving the appropriate role to each token you create. If you only need read access (i.e., loading a dataset with the
datasets library or retrieving the weights of a model), only give your access token the
Members of organizations can have three different roles:
readrole:read-only access to the Organization's repos and metadata / settings (eg, the Organizations' profile, members list, API token, etc).
writerole: additional write rights to the Organization's repos. They can create, delete or rename any repo in the Organization namespace. They can also edit and delete files with the browser editor and push content with
adminrole: In addition to write rights on repos, admin members can update the Organization's profile, refresh the Organization's API token, and manage the Organization members.
As an organization
admin, go to the "Members" section of the org settings to manage roles for users.
git has an authentication layer to control who can push commits to a repo, but it does not authentify the actual commit authors.
In other words, you can commit changes as
Elon Musk <firstname.lastname@example.org>, push them to your preferred
git host (for instance github.com) and your commit will link to Elon's GitHub profile. (Try it! But don't blame us if Elon gets mad at you for impersonating him)
See this post by Ale Segala for more context: How (and why) to sign
You can prove a commit was authored by you, using GNU Privacy Guard (GPG) and a key server. GPG is a cryptographic tool used to verify the authenticity of a message's origin. We'll explain how to set this up on hf.co below.
The Pro Git book is, as usual, a good resource about commit signing: Pro Git: Signing your work.
The reasons we implemented GPG signing were:
- To provide finer-grained security, especially as more and more Enterprise users rely on the Hub (in the future you'll be able to disallow non-signed commits)
- Coupled with our model eval results metadata, GPG signing enables a cryptographically-secure trustable source of ML benchmarks. 🤯
You will need to install GPG on your system in order to execute the following commands. It's included by default in most Linux distributions. On Windows, it is included in Git Bash (which comes with
You can sign your commits locally using GPG. Then configure your profile to mark these commits as verified on the Hub, so other people can be confident that they come from a trusted source.
For a more in-depth explanation of how git and GPG interact, please visit the the git documentation on the subject
Commits can have the following signing statuses:
|Verified||The commit is signed and the signature is verified|
|Unverified||The commit is signed but the signature could not be verified|
|No signing status||The commit is not signed|
For a commit to be marked as verified, you need to upload the public key used to sign it on your Hugging Face account.
gpg --list-secret-keys command to list the GPG keys for which you have both a public and private key.
A private key is required for signing commits or tags.
If you have no GPG key pair, or you don't want to use the existing keys to sign your commits, go to Generating a new GPG key.
Otherwise, go straight to Adding a GPG key to your account.
To generate a GPG key, run the following:
GPG will then guide you through the process of creating a GPG key pair.
Make sure you specify an email address for this key, and that the email address matches the one you specified in your Hugging Face account.
First, select or generate a GPG key on your computer. Make sure that the email address of the key matches the one of your Hugging Face account and that the email of your account is verified.
Then, export the public part of the selected key:
gpg --armor --export <YOUR KEY ID>
- Then visit your profile settings page and click on Add GPG Key.
Copy & paste the output of the
gpg --export command in the text area and click on Add Key.
- Congratulations ! 🎉 You've just added a GPG key to your account !
The last step is to configure git to sign your commits:
git config user.signingkey <Your GPG Key ID> git config user.email <Your email on hf.co>
You can then add the
-S flag to your
git commit commands to sign your commits !
git commit -S -m "My first signed commit"
Once pushed on the Hub, you should see the commit with a "Verified" badge.