Array of policies with their new order positions
The unique identifier of the policy
The new order position for the policy (must be greater than 0)
>= 1
Changes the priority order of access policies. Policy order is crucial as policies are evaluated in sequence, and the first matching policy determines access permissions.
Array of policies with their new order positions
The unique identifier of the policy
The new order position for the policy (must be greater than 0)
>= 1
Permanently removes an access policy from the tenant. This operation will affect network access permissions for all users and devices covered by this policy.
The unique identifier (UUID) of the policy to delete
Modifies the configuration of an existing access policy including its rules, target users/devices/resources, and access permissions. Changes take effect immediately and affect network access.
The unique identifier (UUID) of the policy to update
Data for updating an existing access policy
Array of group IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440000"]
Array of user IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440001"]
Array of device IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440002"]
Array of gateway IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440004"]
Array of resource IDs to apply this policy to
Example:["550e8400-e29b-41d4-a716-446655440003"]
Admission rule ID for this policy
Example:550e8400-e29b-41d4-a716-446655440005
Human-readable name for the policy
Example:Engineering Team Access
Detailed description of the policy’s purpose and scope
Example:Allows engineering team to access development resources
Whether this policy applies to all groups
Default:false
Example:false
Whether this policy applies to all users
Default:false
Example:false
Whether this policy applies to all devices
Default:false
Example:false
Whether this policy applies to all resources
Default:false
Example:false
Array of source IP addresses or ranges
Example:["192.168.1.0/24","10.0.0.0/8"]
Access mode for this policy
Allowed values:LOCALRESTRICTEDREMOTE
Example:LOCAL
Whether this policy allows (true) or denies (false) access
Example:true
Successfully updated access policy
Access policy defining who can access what resources under what conditions
Unique identifier for the policy
Timestamp when the policy was created
Timestamp when the policy was last modified
Human-readable name for the policy
Whether this policy allows (true) or denies (false) access
Priority order for policy evaluation (lower numbers are evaluated first)
Whether this is a default policy that applies to all entities
Type of resources this policy applies to
Allowed values:PRIVATESAASINTERNETSITETOSITE
Access mode for this policy
Allowed values:LOCALRESTRICTEDREMOTE
Whether this policy applies to all groups
Default:false
Whether this policy applies to all users
Default:false
Whether this policy applies to all devices
Default:false
Whether this policy applies to all resources
Default:false
Group information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"Engineering Team","description":"Team responsible for software development and engineering","maxDevices":10,"isSamlDefaultGroup":false,"idpMapping":["engineering-team","dev-team"]}
User information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","lastConnection":"2023-01-15T14:30:00Z","email":"jane.smith@company.com","status":"ACTIVE","firstName":"Jane","lastName":"Smith","isOwner":false,"maxDevices":5,"image":"https://example.com/avatars/jane-smith.jpg"}
Device information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"John's MacBook Pro","active":true,"lastConnection":"2023-01-15T14:30:00Z","status":"Online","hardwareId":"MAC-001122334455","posture":{"compliant":true,"lastCheck":"2023-01-15T14:30:00Z"},"appVersion":"1.2.3"}
Resource information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"Internal Web Server","type":"PRIVATE","loadBalancingMode":"MANUAL","description":"Internal web server for company applications"}
Network gateway configuration and status information
Source IP addresses or ranges this policy applies to
Complete admission rule information with configuration and metadata
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","name":"Engineering Department Access","type":"ALLOW","rule":"user.department == 'Engineering'","hasTimeConstraint":false,"createdAt":"2023-01-15T10:30:00Z","updatedAt":"2023-01-15T10:30:00Z"}
Detailed description of the policy’s purpose and scope
Retrieves comprehensive information about a specific access policy including its configuration, target entities, rules, and current status.
The unique identifier (UUID) of the policy
Successfully retrieved policy details
Access policy defining who can access what resources under what conditions
Unique identifier for the policy
Timestamp when the policy was created
Timestamp when the policy was last modified
Human-readable name for the policy
Whether this policy allows (true) or denies (false) access
Priority order for policy evaluation (lower numbers are evaluated first)
Whether this is a default policy that applies to all entities
Type of resources this policy applies to
Allowed values:PRIVATESAASINTERNETSITETOSITE
Access mode for this policy
Allowed values:LOCALRESTRICTEDREMOTE
Whether this policy applies to all groups
Default:false
Whether this policy applies to all users
Default:false
Whether this policy applies to all devices
Default:false
Whether this policy applies to all resources
Default:false
Group information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"Engineering Team","description":"Team responsible for software development and engineering","maxDevices":10,"isSamlDefaultGroup":false,"idpMapping":["engineering-team","dev-team"]}
User information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","lastConnection":"2023-01-15T14:30:00Z","email":"jane.smith@company.com","status":"ACTIVE","firstName":"Jane","lastName":"Smith","isOwner":false,"maxDevices":5,"image":"https://example.com/avatars/jane-smith.jpg"}
Device information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"John's MacBook Pro","active":true,"lastConnection":"2023-01-15T14:30:00Z","status":"Online","hardwareId":"MAC-001122334455","posture":{"compliant":true,"lastCheck":"2023-01-15T14:30:00Z"},"appVersion":"1.2.3"}
Resource information within a policy context
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","createdAt":"2023-01-15T14:30:00Z","updatedAt":"2023-01-15T14:30:00Z","name":"Internal Web Server","type":"PRIVATE","loadBalancingMode":"MANUAL","description":"Internal web server for company applications"}
Network gateway configuration and status information
Source IP addresses or ranges this policy applies to
Complete admission rule information with configuration and metadata
Example:{"id":"550e8400-e29b-41d4-a716-446655440000","name":"Engineering Department Access","type":"ALLOW","rule":"user.department == 'Engineering'","hasTimeConstraint":false,"createdAt":"2023-01-15T10:30:00Z","updatedAt":"2023-01-15T10:30:00Z"}
Detailed description of the policy’s purpose and scope
User role definition with specific permissions and capabilities
Unique identifier for the role
Timestamp when the role was created
Timestamp when the role was last modified
Human-readable name of the role
Detailed description of the role’s purpose and permissions
Whether this role can be deleted (system roles are typically not deletable)
Predefined role type that determines the base permissions
Allowed values:OWNERADMINDEFAULTBASICBILLINGAUDITORSUPPORT