Bearer Tokens: These are the most common type of access tokens and can be used by any party in possession of the token to access resources. MAC Tokens: These tokens require the requester to prove their identity by using a cryptographic key in addition to the token itself.