The unique identifier (UUID) of the admission rule to update
Update Admission Rule
Modifies the configuration of an existing admission rule including its name, rule logic, and time constraints. Changes affect access control immediately.
Path Parameters
Body
application/json
Body
The admission rule data to update
UpdateAdmissionRule
Data for updating an admission rule
Rule logic or condition for the admission rule
Example:user.department == 'Engineering'
Human-readable name for the admission rule
Example:Engineering Department Access
Whether this rule includes time-based constraints
Example:false
Response
application/json
Response
Successfully updated the admission rule
AdmissionRule
Complete admission rule information with configuration and metadata
Unique identifier for the admission rule
Example:550e8400-e29b-41d4-a716-446655440000
Timestamp when the rule was created
Example:2023-01-15T10:30:00Z
Timestamp when the rule was last modified
Example:2023-01-15T10:30:00Z
Human-readable name for the admission rule
Example:Engineering Department Access
Type of admission rule (ALLOW, DENY, or CUSTOM)
Allowed values:ALLOWDENYCUSTOM
Example:ALLOW
Whether this rule includes time-based constraints
Example:false
Rule logic or condition for the admission rule
Example:user.department == 'Engineering'
Authentication
Path Parameters
Body
Get Admission Rule Details
Retrieves detailed information about a specific admission rule including its configuration, rule logic, time constraints, and type (ALLOW/DENY/CUSTOM).
Path Parameters
The unique identifier (UUID) of the admission rule
Response
application/json
Response
Successfully retrieved the admission rule
AdmissionRule
Complete admission rule information with configuration and metadata
Unique identifier for the admission rule
Example:550e8400-e29b-41d4-a716-446655440000
Timestamp when the rule was created
Example:2023-01-15T10:30:00Z
Timestamp when the rule was last modified
Example:2023-01-15T10:30:00Z
Human-readable name for the admission rule
Example:Engineering Department Access
Type of admission rule (ALLOW, DENY, or CUSTOM)
Allowed values:ALLOWDENYCUSTOM
Example:ALLOW
Whether this rule includes time-based constraints
Example:false
Rule logic or condition for the admission rule
Example:user.department == 'Engineering'
Authentication
Path Parameters
Remove Admission Rule
Permanently removes an admission rule from the tenant. This operation will affect any policies that reference this rule.
Path Parameters
The unique identifier (UUID) of the admission rule to delete
Response
Response
Successfully deleted the admission rule
Authentication
Path Parameters
Policies
Network access policies and permissions
Create Access Policy
Creates a new access policy that defines which users, devices, and groups can access specific network resources. Policies are the core of the Zero Trust access control system and determine network access permissions.
Body
application/json
Body
CreatePolicy
Data required to create a new access policy
Array of group IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440000"]
Array of user IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440001"]
Array of device IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440002"]
Array of resource IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440003"]
Array of gateway IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440004"]
Admission rule ID for this policy
Example:550e8400-e29b-41d4-a716-446655440005
Human-readable name for the policy
Example:Engineering Team Access
Detailed description of the policy’s purpose and scope
Example:Allows engineering team to access development resources
Whether this policy applies to all groups
Default:false
Example:false
Whether this policy applies to all users
Default:false
Example:false
Whether this policy applies to all devices
Default:false
Example:false
Whether this policy applies to all resources
Default:false
Example:false
Array of source IP addresses or ranges
Example:["192.168.1.0/24","10.0.0.0/8"]
Type of resources this policy applies to
Allowed values:PRIVATESAASINTERNETSITETOSITE
Example:PRIVATE
Access mode for this policy
Allowed values:LOCALRESTRICTEDREMOTE
Example:LOCAL
Whether this policy allows (true) or denies (false) access
Example:true
Response
201 application/json
Response
Successfully created access policy
Policy
Access policy defining who can access what resources under what conditions
Unique identifier for the policy
Timestamp when the policy was created
Timestamp when the policy was last modified
Human-readable name for the policy
Whether this policy allows (true) or denies (false) access
Priority order for policy evaluation (lower numbers are evaluated first)
Whether this is a default policy that applies to all entities
Type of resources this policy applies to
Allowed values:PRIVATESAASINTERNETSITETOSITE
Access mode for this policy
Allowed values:LOCALRESTRICTEDREMOTE
Whether this policy applies to all groups
Default:false
Whether this policy applies to all users
Default:false
Whether this policy applies to all devices
Default:false
Whether this policy applies to all resources
Default:false
Group information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"Engineering Team","description":"Team responsible for software development and engineering","maxDevices":10,"isSamlDefaultGroup":false,"idpMapping":["engineering-team","dev-team"]}
Show Child Parameters
User information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","lastConnection":"2023-01-15T14:30:00Z","email":"jane.smith@company.com","status":"ACTIVE","firstName":"Jane","lastName":"Smith","isOwner":false,"maxDevices":5,"image":"https://example.com/avatars/jane-smith.jpg"}
Show Child Parameters
Device information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"John's MacBook Pro","active":true,"lastConnection":"2023-01-15T14:30:00Z","status":"Online","hardwareId":"MAC-001122334455","posture":{"compliant":true,"lastCheck":"2023-01-15T14:30:00Z"},"appVersion":"1.2.3"}
Show Child Parameters
Resource information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"Internal Web Server","type":"PRIVATE","loadBalancingMode":"MANUAL","description":"Internal web server for company applications"}
Show Child Parameters
Network gateway configuration and status information
Show Child Parameters
Source IP addresses or ranges this policy applies to
Complete admission rule information with configuration and metadata
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","name":"Engineering Department Access","type":"ALLOW","rule":"user.department == 'Engineering'","hasTimeConstraint":false,"createdAt":"2023-01-15T10:30:00Z","updatedAt":"2023-01-15T10:30:00Z"}
Show Child Parameters
Detailed description of the policy’s purpose and scope