This endpoint enables you to restrict the search and access privileges of usergroups to audit data.
GET https://<IP-address-of-SPS>/api/acl/audit_data
Header name | Description | Required | Values |
---|---|---|---|
session_id | Contains the authentication token of the user | Required |
The value of the session ID cookie received from the REST server in the authentication response, for example, a1f71d030e657634730b9e887cb59a5e56162860. For details on authentication, see Authenticate to the SPS REST API. Note that this session ID refers to the connection between the REST client and the SPS REST API. It is not related to the sessions that SPS records (and which also have a session ID, but in a different format). |
The following command lists the available audit data access rules.
curl --cookie cookies https://<IP-address-of-SPS>/api/acl/audit_data
The following is a sample response received when querying the endpoint.
For details of the meta object, see Message format.
{ "items": [ { "key": "autogenerated-10211162955b9621d4eb244", "meta": { "href": "/api/acl/audit_data/autogenerated-10211162955b9621d4eb244" } } ], "meta": { "href": "/api/acl/audit_data", "parent": "/api/acl", "remaining_seconds": 600, "transaction": "/api/transaction" } }
Element | Type | Description | ||
---|---|---|---|---|
items | Top-level element (list of JSON objects) | List of endpoints (objects) available from the current endpoint. | ||
key | string | The ID of the endpoint. | ||
meta | Top-level item (JSON object) | Contains the path to the endpoint. | ||
href | string (relative path) | The path of the resource that returned the response. |
To find out the contents of a particular audit data access rule, complete the following steps:
|
NOTE:
If you have an SPS user who has Search > Search in all connections privileges in AAA > Access Control, the autogenerated-all-data-access-id rule is automatically generated. Therefore, you can almost always query this audit data access rule. |
curl --cookie cookies https://<IP-address-of-SPS>/api/acl/audit_data/<key-of-rule-to-be-queried>
The following is a sample response received.
For details of the meta object, see Message format.
{ "body": { "name": "my_ssh_rule", "query": "psm.connection_policy:my_ssh_connection_policy", "groups": [ "ssh-view", "ssh-write" ] }, "key": "autogenerated-10211162955b9621d4eb244", "meta": { "href": "/api/acl/audit_data/autogenerated-10211162955b9621d4eb244", "parent": "/api/acl/audit_data", "remaining_seconds": 600, "transaction": "/api/transaction" } }
Elements | Type | Description | |
---|---|---|---|
body | Top-level element (JSON object) | Contains the JSON object of the rule. | |
|
name |
string |
The human-readable name of the audit data access rule that you specified when you created the rule. |
|
query |
string |
The query that members of the usergroup(s) are allowed to perform. |
groups | list | The usergroup(s) whose access to audit data you want to restrict. |
The following table lists the typical status and error codes for this request. For a complete list of error codes, see Application level error codes.
Code | Description | Notes |
---|---|---|
201 | Created | The new resource was successfully created. |
400 |
SemanticError |
The configuration contains semantic errors, inconsistencies or other problems that would put the system into an unreliable state if the configuration had been applied. The details section contains the errors that were found in the configuration. |
401 | Unauthenticated | The requested resource cannot be retrieved because the client is not authenticated and the resource requires authorization to access it. The details section contains the path that was attempted to be accessed, but could not be retrieved. |
401 | AuthenticationFailure | Authenticating the user with the given credentials has failed. |
404 | NotFound | The requested object does not exist. |
© 2023 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy