Token vs. Resource Group Access Rights Demo
Purpose
This README explains how to set up a quick test to demonstrate how fine-grained tokens interact with resource group permissions in Hugging Face.
The Question We're Answering
If a user has access to a model through a resource group, but their fine-grained token doesn't explicitly mention that model, will an API request to write to the model succeed?
Materials Needed
- Hugging Face account with Enterprise access
- Admin rights to create resource groups
- Permission to create models and tokens
Setup Steps
1. Create a Test Model
- Go to your Hugging Face profile
- Click "New Model"
- Name it "token-test-model" (or similar)
2. Create a Resource Group
- Go to your organization settings
- Navigate to Resource Groups
- Create a new resource group named "token-test-group"
- Add your test model to this resource group
- Add yourself as a user with write permissions to this resource group
3. Create a Fine-Grained Token
- Go to your profile settings (top right icon on the HF page - NOT your organization settings) > select Access Tokens
- Click "Create new Token"
- Select "Fine-grained" as token type
- Give it a name like "limited-test-token"
- Important: DO NOT select your test model or check any global repository permissions
- This token will have minimal, read access to public repositories (which is the default for any token, as noted in the UI: "The token will always have read access to all public repos contents").
- Create the token and save the value on the next screen for testing
4. Test the Token
- Use the API Playground (https://huggingface.co/spaces/enzostvs/hub-api-playground)
- Set up a POST request to
/api/repos/create
- Add your fine-grained token code in the Headers / Authorization section (the code you copied)
- In the BODY section: Type: model Name: whatever_you_want Organization: name_of_your_org (don't worry about Sdk)
- Send the request - it should fail with a permission error
Expected Result
The request will fail despite your user having access to the model through the resource group. This demonstrates that fine-grained tokens require explicit permissions, regardless of resource group access.
Inference Providers
NEW
This model isn't deployed by any Inference Provider.
๐
Ask for provider support
HF Inference deployability: The model has no library tag.