REST API examples
Audit policies
Querying audit policies
Querying audit policies request
curl --cookie cookies.txt --request GET https://<IP-address-of-SPS>/api/configuration/policies/audit_policies |
Querying audit policies response
{ |
"items": [ |
{ |
"body": { |
"encryption": { |
"enabled": false |
}, |
"name": "default", |
"signing": { |
"enabled": false |
}, |
"signing_and_timestamping_interval": 30, |
"timestamping": { |
"enabled": false |
} |
}, |
"key": "78101850949e47437dd91d", |
"meta": { |
"href": "/api/configuration/policies/audit_policies/78101850949e47437dd91d" |
} |
}, |
{ |
"body": { |
"encryption": { |
"enabled": false |
}, |
"name": "remote-timestamping", |
"signing": { |
"enabled": false |
}, |
"signing_and_timestamping_interval": 42, |
"timestamping": { |
"enabled": true, |
"server": { |
"oid": { |
"enabled": true, |
"policy_oid": "2.3.5.3.1.5.32.322.32" |
}, |
"selection": "remote", |
"server_url": "http://tsa.example.com/" |
} |
} |
}, |
"key": "4110330695c094b5776670", |
"meta": { |
"href": "/api/configuration/policies/audit_policies/4110330695c094b5776670" |
} |
} |
], |
"meta": { |
"first": "/api/configuration/policies/aa_plugin_instances", |
"href": "/api/configuration/policies/audit_policies", |
"last": "/api/configuration/policies/usermapping_policies", |
"next": "/api/configuration/policies/backup_policies", |
"parent": "/api/configuration/policies", |
"previous": "/api/configuration/policies/archive_cleanup_policies", |
"transaction": "/api/transaction" |
} |
} |
Querying the default audit policy
Querying the default audit policy request
curl --cookie cookies.txt --request GET https://<IP-address-of-SPS>/api/configuration/policies/audit_policies/78101850949e47437dd91d |
Querying the default audit policy response
{ |
"key": "78101850949e47437dd91d", |
"body": |
{ |
"name": "default", |
"timestamping": { |
"enabled": false |
}, |
"encryption": { |
"enabled": false |
}, |
"signing": { |
"enabled": false |
}, |
"signing_and_timestamping_interval": 30 |
}, |
"meta": { |
"first": "/api/configuration/policies/audit_policies/78101850949e47437dd91d", |
"href": "/api/configuration/policies/audit_policies/78101850949e47437dd91d", |
"last": "/api/configuration/policies/audit_policies/4110330695c094b5776670", |
"next": "/api/configuration/policies/audit_policies/4110330695c094b5776670", |
"parent": "/api/configuration/policies/audit_policies", |
"previous": null, |
"transaction": "/api/transaction" |
} |
} |
Querying a specific audit policy
Querying a specific audit policy request
curl --cookie cookies.txt --request GET https://<IP-address-of-SPS>/api/configuration/policies/audit_policies/4110330695c094b5776670 |
Querying a specific audit policy response
{ |
"body": { |
"encryption": { |
"enabled": false |
}, |
"name": "remote-timestamping", |
"signing": { |
"enabled": false |
}, |
"signing_and_timestamping_interval": 42, |
"timestamping": { |
"enabled": true, |
"server": { |
"oid": { |
"enabled": true, |
"policy_oid": "2.3.5.3.1.5.32.322.32" |
}, |
"selection": "remote", |
"server_url": "http://tsa.example.com/" |
} |
} |
}, |
"key": "4110330695c094b5776670", |
"meta": { |
"first": "/api/configuration/policies/audit_policies/78101850949e47437dd91d", |
"href": "/api/configuration/policies/audit_policies/4110330695c094b5776670", |
"last": "/api/configuration/policies/audit_policies/4110330695c094b5776670", |
"next": null, |
"parent": "/api/configuration/policies/audit_policies", |
"previous": "/api/configuration/policies/audit_policies/78101850949e47437dd91d", |
"transaction": "/api/transaction" |
} |
} |
Configure only upstream encription
Configure only upstream encription request
curl --cookie cookies.txt --request POST --data '@-' https://<IP-address-of-SPS>/api/configuration/policies/audit_policies <<'REQUEST' |
{ |
"name": "upstream_only", |
"timestamping": { |
"enabled": false |
}, |
"encryption": { |
"enabled": true, |
"certificates": [], |
"different_certificates_for_upstream": { |
"enabled": true, |
"certificates": [ |
{ |
"certificate": { |
"pem": "-----BEGIN CERTIFICATE-----\nMIIEgjCCA2qgAwIBAgIBITANBgkqhkiG9w0BAQsFADCBzDELMAkGA1UEBhMCUk8x\nFTATBgNVBAgMDFRoZVJvb3RTdGF0ZTEYMBYGA1UEBwwPVGhlUm9vdExvY2FsaXR5\nMRwwGgYDVQQKDBNUaGVSb290T3JnYW5pemF0aW9uMSIwIAYDVQQLDBlUaGVSb290\nT3JnYW5pemF0aW9uYWxVbml0MSAwHgYDVQQDDBd0aGUucm9vdC5jb21tb24ubmFt\nZS5pbzEoMCYGCSqGSIb3DQEJARYZdGhlQHJvb3QuZW1haWwuYWRkcmVzcy5pbzAe\nFw0xNDA4MjUxMjQ0MjFaFw0yNDA4MjIxMjQ0MjFaMIHMMQswCQYDVQQGEwJDUjEV\nMBMGA1UECAwMVGhlQ2VydFN0YXRlMRgwFgYDVQQHDA9UaGVDZXJ0TG9jYWxpdHkx\nHDAaBgNVBAoME1RoZUNlcnRPcmdhbml6YXRpb24xIjAgBgNVBAsMGVRoZUNlcnRP\ncmdhbml6YXRpb25hbFVuaXQxIDAeBgNVBAMMF3RoZS5jZXJ0LmNvbW1vbi5uYW1l\nLmlvMSgwJgYJKoZIhvcNAQkBFhl0aGVAY2VydC5lbWFpbC5hZGRyZXNzLmlvMIIB\nIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/JERC+o1UksvUfbzS5Yp77CN\nlS6RkkdZLPjl2i9+ACzv/lOy4Kn6qLMRPEj/evRKNiu8vdMLPANN1rYG8IioxetE\nhKj3OVyj5YBJ1BJqJiUrCbkGQCNX2zlfD/VsPDKvtMmcM6F/PEUwl577uQcXhquz\nKeJpSgDbwcANcUNm30YkpT9MTEjfYPdPaLb9jh8+7K3c29ZsJzIRSY3jRISqvK/L\nYNs07oDXfEpeZBNliqTvqhii/0ohnUdKVkXnusLCBb2lyaiOY2nhMz4U2023gJBZ\n3q9ny8dpH3y4RxuygqlhqEaxsDTfMeuWDTkKIxaWHgat/+yeSssXUHx4bu1jTwID\nAQABo20wazAJBgNVHRMEAjAAMBEGCWCGSAGG+EIBAQQEAwIGQDALBgNVHQ8EBAMC\nBeAwHQYDVR0OBBYEFPMG1JzFCtuh8ry7ru5C2IMFPmCLMB8GA1UdIwQYMBaAFBwk\ntYLmRkTRzUryEUQobduVjiThMA0GCSqGSIb3DQEBCwUAA4IBAQAomh6B7H4WsGDL\nzyduEVX6otMhu82j7oeK2WuYaHczHPPzQc0pVTl7TOMMuQR3xNeohuUx7mFjx6MO\n11ksdN4lzo9r94GjYrO9WvRTsQDMJxsrVry49MKjh4Gg21IAuKxvdU9MMUhuhblQ\ntxSpikxMpynf1JK3C+A57M3yAhCCPLjDX1iWXuyGIW28J0FEdTTNAinBRyy18wFG\n/vfOVn1sKpAp5nT8CWWHt3KNOVPsUh41GulBzMFEXSTSggzD/B1dNBfC752k0AGy\nOVHLqWAqnoM6Go9bhkrRWGhH0YIHZFtEeIuNsPYnULNS5yOS3a0FMOpHBQ8kfz9R\nGwrzti7q\n-----END CERTIFICATE-----\n" |
}, |
"four_eyes_certificate": null |
} |
] |
} |
}, |
"signing": { |
"enabled": false |
}, |
"signing_and_timestamping_interval": 30 |
} |
REQUEST |
Configure signing without traffic encryption
Configure signing without traffic encryption request
curl --cookie cookies.txt --request POST --data '@-' https://<IP-address-of-SPS>/api/configuration/policies/audit_policies <<'REQUEST' |
{ |
"name": "sign_no_traffic_encryption", |
"timestamping": { |
"enabled": false |
}, |
"encryption": { |
"enabled": false |
}, |
"signing": { |
"enabled": true, |
"x509_identity": "x509-identity-0" |
}, |
"signing_and_timestamping_interval": 30 |
} |
REQUEST |
Configure signing, and traffic encryption with a single certificate
Configure signing, and traffic encryption with a single certificate request
curl --cookie cookies.txt --request POST --data '@-' https://<IP-address-of-SPS>/api/configuration/policies/audit_policies <<'REQUEST' |
{ |
"name": "sign_with_traffic_encryption", |
"timestamping": { |
"enabled": false |
}, |
"encryption": { |
"enabled": true, |
"certificates": [ |
{ |
"certificate": { |
"pem": "-----BEGIN CERTIFICATE-----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\nGwrzti7q\n-----END CERTIFICATE-----\n" |
}, |
"four_eyes_certificate": null |
} |
], |
"different_certificates_for_upstream": { |
"enabled": false |
} |
}, |
"signing": { |
"enabled": true, |
"x509_identity": "x509-identity-0" |
}, |
"signing_and_timestamping_interval": 30 |
} |
REQUEST |
Configure without timestamping
Configure without timestamping request
curl --cookie cookies.txt --request POST --data '@-' https://<IP-address-of-SPS>/api/configuration/policies/audit_policies <<'REQUEST' |
{ |
"name": "timestamping_disabled", |
"timestamping": { |
"enabled": false |
}, |
"encryption": { |
"enabled": false |
}, |
"signing": { |
"enabled": false |
}, |
"signing_and_timestamping_interval": 30 |
} |
REQUEST |
Configure local timestamping
Configure local timestamping request
curl --cookie cookies.txt --request POST --data '@-' https://<IP-address-of-SPS>/api/configuration/policies/audit_policies <<'REQUEST' |
{ |
"name": "local_timestamping", |
"timestamping": { |
"enabled": true, |
"server": { |
"selection": "local" |
} |
}, |
"encryption": { |
"enabled": false |
}, |
"signing": { |
"enabled": false |
}, |
"signing_and_timestamping_interval": 30 |
} |
REQUEST |
Configure external timestamping
Configure external timestamping request
curl --cookie cookies.txt --request POST --data '@-' https://<IP-address-of-SPS>/api/configuration/policies/audit_policies <<'REQUEST' |
{ |
"name": "external_timestamping", |
"timestamping": { |
"enabled": true, |
"server": { |
"selection": "remote", |
"server_url": "http://tsa.example.com/", |
"oid": { |
"enabled": true, |
"policy_oid": "2.3.5.3.1.5.32.322.32" |
} |
} |
}, |
"encryption": { |
"enabled": false |
}, |
"signing": { |
"enabled": false |
}, |
"signing_and_timestamping_interval": 30 |
} |
REQUEST |
Audited users
Querying audited users
Querying audited users request
curl --cookie cookies.txt --request GET https://<IP-address-of-SPS>/api/audit/users |
Querying audited users response
{ |
"items": [ |
{ |
"has_valid_score": false, |
"id": "userName4", |
"last_seen": "2023-06-21T15:31:40.000Z", |
"score": null, |
"score_timestamp": "2023-06-22T03:31:40.000Z" |
}, |
{ |
"has_valid_score": true, |
"id": "userName1", |
"last_seen": "2023-06-08T07:20:09.000Z", |
"score": 1, |
"score_timestamp": "2023-06-06T03:23:25.000Z" |
}, |
{ |
"has_valid_score": true, |
"id": "userName3", |
"last_seen": "2023-05-06T12:50:05.000Z", |
"score": 2, |
"score_timestamp": "2023-05-05T23:15:45.000Z" |
}, |
{ |
"has_valid_score": false, |
"id": "userName2", |
"last_seen": "2023-05-06T03:23:25.000Z", |
"score": 3, |
"score_timestamp": "2023-05-05T09:22:25.000Z" |
} |
], |
"meta": { |
"href": "/api/audit/users", |
"limit": 100, |
"parent": "/api/audit" |
} |
} |
Querying audited users using the `limit` parameter to limit the search results
Querying audited users using the `limit` parameter to limit the search results request
curl --cookie cookies.txt --request GET https://<IP-address-of-SPS>/api/audit/users?limit=1 |
Querying audited users using the `limit` parameter to limit the search results response
{ |
"items": [ |
{ |
"has_valid_score": false, |
"id": "userName4", |
"last_seen": "2023-06-21T15:31:40.000Z", |
"score": null, |
"score_timestamp": "2023-06-22T03:31:40.000Z" |
} |
], |
"meta": { |
"href": "/api/audit/users", |
"limit": 1, |
"parent": "/api/audit" |
} |
} |
Querying audited users using the `sort` parameter to sort the search results
Querying audited users using the `sort` parameter to sort the search results request
curl --cookie cookies.txt --request GET https://<IP-address-of-SPS>/api/audit/users?sort=score |
Querying audited users using the `sort` parameter to sort the search results response
{ |
"items": [ |
{ |
"has_valid_score": false, |
"id": "userName4", |
"last_seen": "2023-06-21T15:31:40.000Z", |
"score": null, |
"score_timestamp": "2023-06-22T03:31:40.000Z" |
}, |
{ |
"has_valid_score": true, |
"id": "userName1", |
"last_seen": "2023-06-08T07:20:09.000Z", |
"score": 1, |
"score_timestamp": "2023-06-06T03:23:25.000Z" |
}, |
{ |
"has_valid_score": true, |
"id": "userName3", |
"last_seen": "2023-05-06T12:50:05.000Z", |
"score": 2, |
"score_timestamp": "2023-05-05T23:15:45.000Z" |
}, |
{ |
"has_valid_score": false, |
"id": "userName2", |
"last_seen": "2023-05-06T03:23:25.000Z", |
"score": 3, |
"score_timestamp": "2023-05-05T09:22:25.000Z" |
} |
], |
"meta": { |
"href": "/api/audit/users", |
"limit": 100, |
"parent": "/api/audit" |
} |
} |
Querying audited users using the `has_valid_score` parameter to filter the search results
Querying audited users using the `has_valid_score` parameter to filter the search results request
curl --cookie cookies.txt --request GET https://<IP-address-of-SPS>/api/audit/users?has_valid_score=true |
Querying audited users using the `has_valid_score` parameter to filter the search results response
{ |
"items": [ |
{ |
"has_valid_score": true, |
"id": "userName1", |
"last_seen": "2023-06-08T07:20:09.000Z", |
"score": 1, |
"score_timestamp": "2023-06-06T03:23:25.000Z" |
}, |
{ |
"has_valid_score": true, |
"id": "userName3", |
"last_seen": "2023-05-06T12:50:05.000Z", |
"score": 2, |
"score_timestamp": "2023-05-05T23:15:45.000Z" |
} |
], |
"meta": { |
"href": "/api/audit/users", |
"limit": 100, |
"parent": "/api/audit" |
} |
} |
Configuration default values
Querying the default values for singleton resources, for example syslog servers
Querying the default values for singleton resources, for example syslog servers request
curl --cookie cookies.txt --request PUT --data '@-' https://<IP-address-of-SPS>/api/configuration/management/syslog?defaults <<'REQUEST' |
{ |
"receivers": [ |
{} |
] |
} |
REQUEST |
Querying the default values for singleton resources, for example syslog servers response
{ |
"body": { |
"encryption": { |
"client_authentication": null, |
"trust_store": null |
}, |
"include_node_id": true, |
"receivers": [ |
{ |
"address": { |
"selection": "ip", |
"value": "127.0.0.1" |
}, |
"port": 514, |
"protocol": { |
"ip_protocol": "tcp", |
"protocol_type": "legacy-bsd", |
"tls_enabled": false |
} |
} |
] |
}, |
"key": "syslog", |
"meta": { |
"first": "/api/configuration/management/accounting", |
"href": "/api/configuration/management/syslog", |
"last": "/api/configuration/management/web_gateway_authentication", |
"next": "/api/configuration/management/system_backup", |
"parent": "/api/configuration/management", |
"previous": "/api/configuration/management/support_info", |
"transaction": "/api/transaction" |
} |
} |
Querying defaults for objects in a container, for example SSH authentication policies
Querying defaults for objects in a container, for example SSH authentication policies request
curl --cookie cookies.txt --request POST --data '@-' https://<IP-address-of-SPS>/api/configuration/ssh/authentication_policies?defaults <<'REQUEST' |
{ |
"backend": { |
"selection": "radius" |
} |
} |
REQUEST |
Querying defaults for objects in a container, for example SSH authentication policies response
{ |
"body": { |
"backend": { |
"authentication_protocol": "pap", |
"selection": "radius", |
"servers": [ |
{ |
"address": { |
"selection": "ip", |
"value": "127.0.0.1" |
}, |
"port": 1812, |
"shared_secret": { |
"key": "", |
"meta": { |
"href": "/api/configuration/passwords" |
} |
} |
} |
] |
}, |
"gateway_methods": { |
"kerberos": false, |
"password": false, |
"public_key": false |
}, |
"name": "unnamed-ssh-authentication-policy", |
"relayed_methods": { |
"kerberos": false, |
"keyboard_interactive": true, |
"password": true, |
"public_key": { |
"selection": "agent" |
} |
} |
}, |
"key": "", |
"meta": { |
"first": "/api/configuration/ssh/authentication_policies", |
"href": "/api/configuration/ssh/authentication_policies", |
"last": "/api/configuration/ssh/settings_policies", |
"next": "/api/configuration/ssh/channel_policies", |
"parent": "/api/configuration/ssh", |
"previous": null, |
"transaction": "/api/transaction" |
} |
} |