The unique identifier (UUID) of the admission rule to delete
Remove Admission Rule
Permanently removes an admission rule from the tenant. This operation will affect any policies that reference this rule.
Path Parameters
Response
Response
Successfully deleted the admission rule
Authentication
Path Parameters
Policies
Network access policies and permissions
Create Access Policy
Creates a new access policy that defines which users, devices, and groups can access specific network resources. Policies are the core of the Zero Trust access control system and determine network access permissions.
Body
application/json
Body
CreatePolicy
Data required to create a new access policy
Array of group IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440000"]
Array of user IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440001"]
Array of device IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440002"]
Array of resource IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440003"]
Array of gateway IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440004"]
Admission rule ID for this policy
Example:550e8400-e29b-41d4-a716-446655440005
Human-readable name for the policy
Example:Engineering Team Access
Detailed description of the policy’s purpose and scope
Example:Allows engineering team to access development resources
Whether this policy applies to all groups
Default:false
Example:false
Whether this policy applies to all users
Default:false
Example:false
Whether this policy applies to all devices
Default:false
Example:false
Whether this policy applies to all resources
Default:false
Example:false
Array of source IP addresses or ranges
Example:["192.168.1.0/24","10.0.0.0/8"]
Type of resources this policy applies to
Allowed values:PRIVATESAASINTERNETSITETOSITE
Example:PRIVATE
Access mode for this policy
Allowed values:LOCALRESTRICTEDREMOTE
Example:LOCAL
Whether this policy allows (true) or denies (false) access
Example:true
Response
201 application/json
Response
Successfully created access policy
Policy
Access policy defining who can access what resources under what conditions
Unique identifier for the policy
Timestamp when the policy was created
Timestamp when the policy was last modified
Human-readable name for the policy
Whether this policy allows (true) or denies (false) access
Priority order for policy evaluation (lower numbers are evaluated first)
Whether this is a default policy that applies to all entities
Type of resources this policy applies to
Allowed values:PRIVATESAASINTERNETSITETOSITE
Access mode for this policy
Allowed values:LOCALRESTRICTEDREMOTE
Whether this policy applies to all groups
Default:false
Whether this policy applies to all users
Default:false
Whether this policy applies to all devices
Default:false
Whether this policy applies to all resources
Default:false
Group information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"Engineering Team","description":"Team responsible for software development and engineering","maxDevices":10,"isSamlDefaultGroup":false,"idpMapping":["engineering-team","dev-team"]}
Show Child Parameters
User information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","lastConnection":"2023-01-15T14:30:00Z","email":"jane.smith@company.com","status":"ACTIVE","firstName":"Jane","lastName":"Smith","isOwner":false,"maxDevices":5,"image":"https://example.com/avatars/jane-smith.jpg"}
Show Child Parameters
Device information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"John's MacBook Pro","active":true,"lastConnection":"2023-01-15T14:30:00Z","status":"Online","hardwareId":"MAC-001122334455","posture":{"compliant":true,"lastCheck":"2023-01-15T14:30:00Z"},"appVersion":"1.2.3"}
Show Child Parameters
Resource information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"Internal Web Server","type":"PRIVATE","loadBalancingMode":"MANUAL","description":"Internal web server for company applications"}
Show Child Parameters
Network gateway configuration and status information
Show Child Parameters
Source IP addresses or ranges this policy applies to
Complete admission rule information with configuration and metadata
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","name":"Engineering Department Access","type":"ALLOW","rule":"user.department == 'Engineering'","hasTimeConstraint":false,"createdAt":"2023-01-15T10:30:00Z","updatedAt":"2023-01-15T10:30:00Z"}
Show Child Parameters
Detailed description of the policy’s purpose and scope
Authentication
Body
List All Access Policies
Retrieves a paginated list of all access policies for the tenant with advanced filtering capabilities. Policies are ordered by priority and determine network access permissions for users and devices.
Query Parameters
Sort order in JSON format {“field”: “direction”}. Sortable fields: id, order. Direction: asc, desc
Example:-order,id
Filter policies by resource ID (UUID format)
Example:123e4567-e89b-12d3-a456-426614174000
Filter policies by all resources flag
Example:true
Filter policies by device ID (UUID format)
Example:123e4567-e89b-12d3-a456-426614174000
Filter policies by group ID (UUID format)
Example:123e4567-e89b-12d3-a456-426614174000
Filter policies by user ID (UUID format)
Example:123e4567-e89b-12d3-a456-426614174000
Filter policies by all users flag
Example:true
Filter policies by all groups flag
Example:false
Filter policies by all devices flag
Example:true
Filter policies by rule ID (UUID format)
Example:123e4567-e89b-12d3-a456-426614174000
Filter policies by ID (UUID format)
Example:123e4567-e89b-12d3-a456-426614174000
Filter policies by name
Example:My Policy
Filter policies by type
Allowed values:PRIVATESAASINTERNETSITETOSITE
Number of policies to skip (minimum: 0). Use with “page[limit]”. For page N (0-based), compute as N × page[limit].
Example:0
Number of policies to return per page (minimum: 1). Use with “page[offset]” for pagination.
Example:10
Response
200
Response
Authentication
Query Parameters
Reorder Access Policies
Changes the priority order of access policies. Policy order is crucial as policies are evaluated in sequence, and the first matching policy determines access permissions.
Body
application/json
Body
Array of policies with their new order positions
The unique identifier of the policy
The new order position for the policy (must be greater than 0)
>= 1