<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Protegrity REST APIs on</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/</link><description>Recent content in Protegrity REST APIs on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/index.xml" rel="self" type="application/rss+xml"/><item><title>Accessing the Protegrity REST APIs</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/protegrity_rest_api_authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/protegrity_rest_api_authentication/</guid><description>&lt;p>The following section lists the requirements for accessing the Protegrity REST APIs.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Available endpoints - Protegrity has enabled the following endpoints to access the REST APIs.&lt;/p>
&lt;dl>
&lt;dt>Base URL&lt;/dt>
&lt;dd>https://&amp;lt;FQDN&amp;gt;/pty/&amp;lt;Version&amp;gt;/&amp;lt;API&amp;gt;&lt;/dd>
&lt;/dl>
&lt;p>Where:&lt;/p>
&lt;ul>
&lt;li>&lt;em>FQDN&lt;/em>: Fully Qualified Domain Name provided by the user during PPC installation.&lt;/li>
&lt;li>&lt;em>Version&lt;/em>: Specifies the version of the API.&lt;/li>
&lt;li>&lt;em>API&lt;/em>: Endpoint of the REST API.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Authentication - You can access the REST APIs using client certificates or tokens. The authentication depends on the type of REST API that you are using.
For more information about accessing the REST APIs using these authentication mechanisms, refer to the section &lt;a href="https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_administration/accessing_rest_api_resources/">Accessing REST API Resources&lt;/a>.&lt;/p></description></item><item><title>View the Protegrity REST API Specification Document</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/protegrity_rest_api_specs_doc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/protegrity_rest_api_specs_doc/</guid><description>&lt;p>The steps mentioned in this section contains the usage of Docker containers and services to download and launch the images for Swagger Editor within a Docker container.&lt;/p>
&lt;p>For more information about Docker, refer to the &lt;a href="https://docs.docker.com/">Docker documentation&lt;/a>.&lt;/p>
&lt;blockquote>
&lt;p>The following example uses Swagger Editor to view the REST API specification document.&lt;/p>&lt;/blockquote>
&lt;ol>
&lt;li>
&lt;p>Install and start the Swagger Editor.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Download the Swagger Editor image within a Docker container using the following command.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>docker pull swaggerapi/swagger-editor
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;/li>
&lt;li>
&lt;p>Launch the Docker container using the following command.&lt;/p></description></item><item><title>Using the Common REST API Endpoints</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_common_rest_apis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_common_rest_apis/</guid><description>&lt;p>The following section specifies the common operations that are applicable to all the Protegrity REST APIs.&lt;/p>
&lt;blockquote>
&lt;p>The Base URL for each API will change depending on the version of the API being used. The following table specifies the version that you must use when executing the common operations for each API.&lt;/p>&lt;/blockquote>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>REST API&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;th>Version in the Base URL &amp;lt;Version&amp;gt;&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>pim&lt;/td>
 &lt;td>Policy Management&lt;/td>
 &lt;td>v2&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>rps&lt;/td>
 &lt;td>Encrypted Resilient Package&lt;/td>
 &lt;td>v1&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>auth&lt;/td>
 &lt;td>Authentication and Token Management&lt;/td>
 &lt;td>v1&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;h2 id="common_rest_api_endpoints">Common REST API Endpoints&lt;/h2>
&lt;p>The following table lists the common operations for the Protegrity REST APIs.&lt;/p></description></item><item><title>Using the Authentication and Token Management REST APIs</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_auth_rest_apis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_auth_rest_apis/</guid><description>&lt;blockquote>
&lt;p>The Authentication and Token Management API uses the v1 version.&lt;/p>&lt;/blockquote>
&lt;p>If you want to perform common operations using the Authentication and Token REST API, then refer the section &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_common_rest_apis/">Using the Common REST API Endpoints&lt;/a>.&lt;/p>
&lt;p>The following table provides section references that explain usage of some of the Authentication and Token REST APIs. It includes sample examples to work with the Authentication and Token functions. If you want to view all the Authentication and Token APIs, then use the &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_common_rest_apis/#rest_api_retrieving_the_specification_document">/doc&lt;/a> API to retrieve the API specification.&lt;/p></description></item><item><title>Using the Policy Management REST APIs</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_pmg_rest_apis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_pmg_rest_apis/</guid><description>&lt;blockquote>
&lt;p>&lt;strong>Important&lt;/strong>: The Policy Management REST APIs will work only after you have installed the &lt;code>workbench&lt;/code>.&lt;/p>&lt;/blockquote>
&lt;blockquote>
&lt;p>The user accessing these APIs must have the &lt;em>workbench_management_policy_write&lt;/em> permission for write access and the &lt;em>workbench_management_policy_read&lt;/em> permission for read-only access.&lt;br>
For more information about the roles and permissions required, refer to the section &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/pmg_roles_permissions/">Workbench Roles and Permissions&lt;/a>.&lt;/p>&lt;/blockquote>
&lt;blockquote>
&lt;p>The Policy Management API uses the v2 version.&lt;/p>&lt;/blockquote>
&lt;p>If you want to perform common operations using the Policy Management REST API, then refer the section &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_common_rest_apis/">Using the Common REST API Endpoints&lt;/a>.&lt;/p></description></item><item><title>Using the Encrypted Resilient Package REST APIs</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_resilient_rest_apis/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/using_resilient_rest_apis/</guid><description>&lt;blockquote>
&lt;p>&lt;strong>Important&lt;/strong>: The Encrypted Resilient Package REST API will work only after you have installed the Policy Workbench. For more information about installing Policy Workbench, refer to the section &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/pmg/install_workbench/">Installing Policy Workbench&lt;/a>.&lt;/p>&lt;/blockquote>
&lt;blockquote>
&lt;p>The Encrypted Resilient Package API is only used by the Immutable Resilient protectors.&lt;/p>&lt;/blockquote>
&lt;p>&lt;strong>Before you begin:&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>
&lt;p>Ensure that the concept of resilient protectors and necessity of a resilient package is understood.&lt;br>
For more information on how the REST API is used to export the encrypted resilient package in an immutable policy deployment, refer to the section &lt;a href="https://docs.protegrity.com/protectors/10.0/docs/ap/ap_java/appendix/devops_ap_common/">DevOps Approach for Application Protector&lt;/a>.&lt;/p></description></item><item><title>Roles and Permissions</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/roles_permissions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/protegrity_rest_apis/roles_permissions/</guid><description>&lt;p>Roles are templates that include permissions and users can be assigned to one or more roles. All users in the appliance must be associated with a role.&lt;/p>
&lt;p>The roles packaged with PPC are as follows:&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Roles&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;th>Permissions&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>directory_administrator&lt;/td>
 &lt;td>Role to manage users, groups, and their attributes&lt;/td>
 &lt;td>saml_admin, role_admin, user_manager_admin, can_create_token, password_policy_admin, group_admin&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>directory_viewer&lt;/td>
 &lt;td>Role to query and view users and groups and their attributes&lt;/td>
 &lt;td>saml_viewer, password_policy_viewer, user_manager_viewer, role_viewer, group_viewer&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>security_administrator&lt;/td>
 &lt;td>Role to manage users, roles, groups, and security‑related configurations, including SAML, certificates, packages, and insights&lt;/td>
 &lt;td>can_fetch_package, role_admin, web_admin, cli_access, saml_admin, can_export_certificates, user_manager_admin, can_create_token, password_policy_admin, group_admin, insight_admin&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>security_viewer&lt;/td>
 &lt;td>Role with Read access&lt;/td>
 &lt;td>saml_viewer, password_policy_viewer, insight_viewer, user_manager_viewer, role_viewer, group_viewer&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>The capabilities of a role are defined by the permissions attached to the role. Though roles can be created, modified, or deleted from the appliance, permissions cannot be edited. The permissions that are available to map with a user and packaged with PPC as default permissions are as follows:&lt;/p></description></item></channel></rss>