Disclosed are techniques of sharing an access token. The techniques comprise generating a list that includes indications of users trusted to access a protected resource. The list indicates a first user and a second user. The technique also comprises inputting, by a first device associated with the first user, an authorization grant. The technique further comprises obtaining, by the first device using the authorization grant, an access token for the protected resource. The access token includes credentials for accessing the protected resource. The technique further comprises providing a copy of the access token to the second user by securely transmitting the copy of the access token to a second device associated with the second user. The copy of the access token enables the second device to access the protected resource.