diff --git a/docs/hub/security-tokens.md b/docs/hub/security-tokens.md
index af4822286..40545aff6 100644
--- a/docs/hub/security-tokens.md
+++ b/docs/hub/security-tokens.md
@@ -5,8 +5,8 @@
User Access Tokens are the preferred way to authenticate an application or notebook to Hugging Face services. You can manage your access tokens in your [settings](https://huggingface.co/settings/tokens).
Access tokens allow applications and notebooks to perform specific actions specified by the scope of the roles shown in the following:
@@ -15,6 +15,15 @@ Access tokens allow applications and notebooks to perform specific actions speci
- `write`: tokens with this role additionally grant write access to the repositories you have write access to. Use this token if you need to create or push content to a repository (e.g., when training a model or modifying a model card).
+Note that Organization API Tokens have been deprecated:
+
+
+

+

+
+
+If you are a member of an organization with read/write/admin role, then your User Access Tokens will be able to read/write the resources according to the token permission (read/write) and organization membership (read/write/admin).
+
## How to manage User Access Tokens?
To create an access token, go to your settings, then click on the [Access Tokens tab](https://huggingface.co/settings/tokens). Click on the **New token** button to create a new User Access Token.
@@ -63,4 +72,4 @@ We recommend you create one access token per app or usage. For instance, you cou
This way, you can invalidate one token without impacting your other usages.
-We also recommend only giving the appropriate role to each token you create. If you only need read access (i.e., loading a dataset with the `datasets` library or retrieving the weights of a model), only give your access token the `read` role.
\ No newline at end of file
+We also recommend only giving the appropriate role to each token you create. If you only need read access (e.g., loading a dataset with the `datasets` library or retrieving the weights of a model), only give your access token the `read` role.