When to use PATs
| Scenario | Recommended auth |
|---|---|
| Local development | OAuth via pipecat cloud auth login |
| CI/CD pipelines | PAT via PIPECAT_TOKEN env var |
| Docker / remote servers | PAT via PIPECAT_TOKEN or use-pat |
| Shared automation scripts | PAT via PIPECAT_TOKEN env var |
PATs are different from API keys. API keys authenticate REST API requests
to start agent sessions or manage resources. PATs authenticate you (or a
service account) to the CLI — they are not intended for direct API calls.
Creating a PAT
Generate a PAT from the Pipecat Cloud dashboard:Open account settings
Navigate to Account Settings → Personal Access
Tokens in the dashboard.
Create a new token
Click Create Token, give it a descriptive name (e.g.
github-actions-deploy), and copy the token value. PATs start with
pcc_pat_.Using a PAT
Environment variable (recommended)
SetPIPECAT_TOKEN before running any CLI command. The CLI will authenticate using the token and automatically resolve your default organization.
PIPECAT_ORG as well:
Storing a PAT locally
If you prefer not to set an environment variable each time, you can store a PAT in your local config file:~/.config/pipecatcloud/pipecatcloud.toml. All subsequent commands will use it automatically, just like after auth login.
CI/CD examples
GitHub Actions
Add your PAT as a repository secret namedPIPECAT_TOKEN, then reference it in your workflow:
GitLab CI
AddPIPECAT_TOKEN as a CI/CD variable (Settings → CI/CD → Variables, masked):
PIPECAT_TOKEN without additional configuration.
Security considerations
- Treat PATs like passwords. Anyone with your token can act as you.
- Use your CI platform’s secret store. Never commit tokens to source control.
- Scope tokens to purpose. Create separate PATs for different pipelines so you can revoke them independently.
- Rotate periodically. Delete old tokens from the dashboard and generate new ones.
Next steps
CI with GitHub Actions
Automate deploys with the official GitHub Action.
Accounts and Organizations
Learn about organizations, API keys, and access control.