A properly formatted GET request to /security/token generates a transient token that is required for other commands to work. I’m looking to better understand how this token works. I can tell via testing that it’s not limited to a single use. I can’t tell if it’s time limited or if there are any other limitations. Can anyone shed light on how this works? I haven’t been able to find any documentation on it other than mentions in passing of where it’s required.