Requesting Policy Decisions Using REST
You can request policy decisions from AM by using the REST API described in this section. AM evaluates requests based on the context and the policies configured, and returns decisions that indicate what actions are allowed or denied, as well as any attributes or advice for the resources specified.
Note
This section does not apply to OAuth 2.0 policies.
AM provides the /json/realms/root/policies
endpoint to request policy evaluation.
When making a REST API call, specify the realm in the path component of the endpoint. You must specify the entire hierarchy of the realm, starting at the Top Level Realm. Prefix each realm in the hierarchy with the realms/
keyword. For example /realms/root/realms/customers/realms/europe
.
Before making a REST API call to request manage a policy component, make sure that you have:
Authenticated successfully to AM as a user with sufficient privileges to make the REST API call.
Obtained the session token returned after successful authentication.
When making the REST API call, pass the session token in the HTTP header. For more information about the AM session token and its use in REST API calls, see "Using the Session Token After Authentication".
To request decisions for specific resources, see "Requesting Policy Decisions For Specific Resources".
To request decisions for a resource and all resources beneath it, see "Requesting Policy Decisions For a Tree of Resources".
Requesting Policy Decisions For Specific Resources
This section shows how you can request a policy decision over REST for specific resources.
When making a REST API call, specify the realm in the path component of the endpoint. You must specify the entire hierarchy of the realm, starting at the Top Level Realm. Prefix each realm in the hierarchy with the realms/
keyword. For example /realms/root/realms/customers/realms/europe
.
To request policy decisions for specific resources, perform an HTTP POST using the evaluation action to the appropriate path under the URI where AM is deployed, /json/realms/root/realms/{realm}/policies?_action=evaluate
. The payload for the HTTP POST is a JSON object that specifies at least the resources, and takes the following form.
{ "resources": [ "resource1", "resource2", ..., "resourceN" ], "application": "defaults to iPlanetAMWebAgentService if not specified", "subject": { "ssoToken": "SSO token ID string", "jwt": "JSON Web Token string", "claims": { "key": "value", ... } }, "environment": { "optional key1": [ "value", "another value", ... ], "optional key2": [ "value", "another value", ... ], ... } }
The values for the fields shown above are explained below:
"resources"
This required field specifies the list of resources for which to return decisions.
For example, when using the default policy set,
"iPlanetAMWebAgentService"
, you can request decisions for resource URLs.{ "resources": [ "http://www.example.com/index.html", "http://www.example.com/do?action=run" ] }
"application"
This field holds the name of the policy set, and defaults to
"iPlanetAMWebAgentService"
if not specified.For more on policy sets, see "Policy Sets (REST)".
"subject"
This optional field holds an object that represents the subject. You can specify one or more of the following keys. If you specify multiple keys, the subject can have multiple associated principals, and you can use subject conditions corresponding to any type in the request.
"ssoToken"
The value is the SSO token ID string for the subject, returned for example on successful authentication as described in Authenticating (REST).
You can use an OpenID Connect ID token if the client that the token has been issued for is authorized to use ID tokens as session tokens. For more information, see "Using ID Tokens as Session Tokens".
"jwt"
The value is a JWT string.
Note
If you pass the subject details as a JWT, AM does not attempt to validate the JWT signature or the claims in the JWT. It is assumed that you have already validated the JWT before calling the authorization endpoint. For AM-issued ID Tokens, you can, instead, pass the ID Token as the value of the
ssoToken
field (after adding your client to the Authorized SSO Clients list). In this case, AM will validate the token. For more information, see "Using ID Tokens as Subjects in Policy Decision"."claims"
The value is an object (map) of JWT claims to their values. Any string is permitted, but you must include the
sub
claim.
If you do not specify the subject, AM uses the SSO token ID of the subject making the request.
"environment"
This optional field holds a map of keys to lists of values.
If you do not specify the environment, the default is an empty map.
The example below requests policy decisions for two URL resources. The iPlanetDirectoryPro
header sets the SSO token for a user who has access to perform the operation.
$curl \ --request POST \ --header "Content-Type: application/json" \ --header "Accept-API-Version: resource=2.1" \ --header "iPlanetDirectoryPro: AQIC5..." \ --data '{ "resources":[ "http://www.example.com/index.html", "http://www.example.com/do?action=run" ], "application":"iPlanetAMWebAgentService" }' \ "https://openam.example.com:8443/openam/json/realms/root/policies?_action=evaluate"
[ { "resource":"http://www.example.com/do?action=run", "actions":{ }, "attributes":{ }, "advices":{ "AuthLevelConditionAdvice":[ "3" ] } }, { "resource":"http://www.example.com/index.html", "actions":{ "POST":false, "GET":true }, "attributes":{ "cn":[ "demo" ] }, "advices":{ } } ]
In the JSON list of decisions returned for each resource, AM includes these fields.
"resource"
A resource specified in the request.
The decisions returned are not guaranteed to be in the same order as the resources were requested.
"actions"
A map of action name keys to Boolean values that indicate whether the action is allowed (
true
) or denied (false
) for the specified resource.In the example, for resource
http://www.example.com:80/index.html
HTTP GET is allowed, whereas HTTP POST is denied."attributes"
A map of attribute names to their values, if any response attributes are returned according to applicable policies.
In the example, the policy that applies to
http://www.example.com:80/index.html
causes that the value of the subject's "cn" profile attribute to be returned."advices"
A map of advice names to their values, if any advice is returned according to applicable policies.
The
"advices"
field can provide hints regarding what AM needs to take the authorization decision.In the example, the policy that applies to
http://www.example.com:80/do?action=run
requests that the subject be authenticated at an authentication level of at least 3.{ "advices": { "AuthLevelConditionAdvice": [ "3" ] } }
See "Policy Decision Advice" for details.
You can use the query string parameters _prettyPrint=true
to make the output easier to read, and _fields=field-name[,field-name...]
to limit the fields returned in the output.
Policy Decision Advice
When AM returns a policy decision, the JSON for the decision can include an "advices" field. This field contains hints for the policy enforcement point.
{ "advices": { "type": [ "advice" ] } }
The "advices" returned depend on policy conditions. For more information about AM policy conditions, see "Policies (REST)".
This section shows examples of the different types of policy decision advice and the conditions that cause AM to return the advice.
"AuthLevel"
and "LEAuthLevel"
condition failures can result in advice showing the expected or maximum possible authentication level. For example, failure against the following condition:
{ "type": "AuthLevel", "authLevel": 2 }
Leads to this advice:
{ "AuthLevelConditionAdvice": [ "2" ] }
An "AuthScheme"
condition failure can result in advice showing one or more required authentication modules. For example, failure against the following condition:
{ "type": "AuthScheme", "authScheme": [ "HOTP" ], "applicationName": "iPlanetAMWebAgentService", "applicationIdleTimeout": 10 }
Leads to this advice:
{ "AuthSchemeConditionAdvice": [ "HOTP" ] }
An "AuthenticateToRealm"
condition failure can result in advice showing the name of the realm to which authentication is required. For example, failure against the following condition:
{ "type": "AuthenticateToRealm", "authenticateToRealm": "MyRealm" }
Leads to this advice:
{ "AuthenticateToRealmConditionAdvice": [ "/myRealm" ] }
An "AuthenticateToService"
condition failure can result in advice showing the name of the required authentication chain. For example, failure against the following condition:
{ "type": "AuthenticateToService", "authenticateToService": "MyAuthnChain" }
Leads to this advice:
{ "AuthenticateToServiceConditionAdvice": [ "MyAuthnChain" ] }
A "ResourceEnvIP"
condition failure can result in advice showing that indicates corrective action to be taken to resolve the problem. The advice varies, depending on what the condition tests. For example, failure against the following condition:
{ "type": "ResourceEnvIP", "resourceEnvIPConditionValue": [ "IF IP=[127.0.0.12] THEN authlevel=4" ] }
Leads to this advice:
{ "AuthLevelConditionAdvice": [ "4" ] }
Failure against a different type of "ResourceEnvIP"
condition such as the following:
{ "type": "ResourceEnvIP", "resourceEnvIPConditionValue": [ "IF IP=[127.0.0.11] THEN service=MyAuthnChain" ] }
Leads to this advice:
{ "AuthenticateToServiceConditionAdvice": [ "MyAuthnChain" ] }
A "Session"
condition failure can result in advice showing that access has been denied because the user's session has been active longer than allowed by the condition. The advice will also show if the user's session was terminated and reauthentication is required. For example, failure against the following condition:
{ "type": "Session", "maxSessionTime": "10", "terminateSession": false }
Leads to this advice:
{ "SessionConditionAdvice": [ "deny" ] }
When policy evaluation denials occur against the following conditions, AM does not return any advice:
IPv4
IPv6
LDAPFilter
OAuth2Scope
SessionProperty
SimpleTime
Requesting Policy Decisions For a Tree of Resources
This section shows how you can request policy decisions over REST for a resource and all other resources in the subtree beneath it.
When making a REST API call, specify the realm in the path component of the endpoint. You must specify the entire hierarchy of the realm, starting at the Top Level Realm. Prefix each realm in the hierarchy with the realms/
keyword. For example /realms/root/realms/customers/realms/europe
.
To request policy decisions for a tree of resources, perform an HTTP POST using the evaluation action to the appropriate path under the URI where AM is deployed, for example /json/realms/root/realms/myRealm/policies?_action=evaluateTree
The payload for the HTTP POST is a JSON object that specifies at least the root resource, and takes the following form.
{ "resource": "resource string", "application": "defaults to iPlanetAMWebAgentService if not specified", "subject": { "ssoToken": "SSO token ID string", "jwt": "JSON Web Token string", "claims": { "key": "value", ... } }, "environment": { "optional key1": [ "value", "another value", ... ], "optional key2": [ "value", "another value", ... ], ... } }
The values for the fields shown above are explained below:
"resource"
This required field specifies the root resource for the decisions to return.
For example, when using the default policy set,
"iPlanetAMWebAgentService"
, you can request decisions for resource URLs.{ "resource": "http://www.example.com/" }
"application"
This field holds the name of the policy set, and defaults to
"iPlanetAMWebAgentService"
if not specified.For more on policy sets, see "Policy Sets (REST)".
"subject"
This optional field holds an object that represents the subject. You can specify one or more of the following keys. If you specify multiple keys, the subject can have multiple associated principals, and you can use subject conditions corresponding to any type in the request.
"ssoToken"
The value is the SSO token ID string for the subject, returned for example on successful authentication as described in, Authenticating (REST).
"jwt"
The value is a JWT string.
Note
If you pass the subject details as a JWT, AM does not attempt to validate the JWT signature or the claims in the JWT. It is assumed that you have already validated the JWT before calling the authorization endpoint. For AM-issued ID Tokens, you can, instead, pass the ID Token as the value of the
ssoToken
field (after adding your client to the Authorized SSO Clients list). In this case, AM will validate the token. For more information, see "Using ID Tokens as Subjects in Policy Decision"."claims"
The value is an object (map) of JWT claims to their values.
If you do not specify the subject, AM uses the SSO token ID of the subject making the request.
"environment"
This optional field holds a map of keys to lists of values.
If you do not specify the environment, the default is an empty map.
The example below requests policy decisions for http://www.example.com/
. The iPlanetDirectoryPro
header sets the SSO token for a user who has access to perform the operation, and the subject takes the SSO token of the user who wants to access a resource.
$curl \ --request POST \ --header "Content-Type: application/json" \ --header "iPlanetDirectoryPro: AQIC5...NDU1*" \ --header "Accept-API-Version: resource=1.0" \ --data '{ "resource": "http://www.example.com/", "subject": { "ssoToken": "AQIC5...zE4*" } }' \ "https://openam.example.com:8443/openam/json/realms/root/policies?_action=evaluateTree"
[ { "resource":"http://www.example.com/", "actions":{ "GET":true, "OPTIONS":true, "HEAD":true }, "attributes":{ }, "advices":{ } }, { "resource":"http://www.example.com/*", "actions":{ "POST":false, "PATCH":false, "GET":true, "DELETE":true, "OPTIONS":true, "HEAD":true, "PUT":true }, "attributes":{ "myStaticAttr":[ "myStaticValue" ] }, "advices":{ } }, { "resource":"http://www.example.com/*?*", "actions":{ "POST":false, "PATCH":false, "GET":false, "DELETE":false, "OPTIONS":true, "HEAD":false, "PUT":false }, "attributes":{ }, "advices":{ "AuthLevelConditionAdvice":[ "3" ] } } ]
Notice that AM returns decisions not only for the specified resource, but also for matching resource names in the tree whose root is the specified resource.
In the JSON list of decisions returned for each resource, AM includes these fields.
"resource"
A resource name whose root is the resource specified in the request.
The decisions returned are not guaranteed to be in the same order as the resources were requested.
"actions"
A map of action name keys to Boolean values that indicate whether the action is allowed (
true
) or denied (false
) for the specified resource.In the example, for matching resources with a query string only HTTP OPTIONS is allowed according to the policies configured.
"attributes"
A map of attribute names to their values, if any response attributes are returned according to applicable policies.
In the example, the policy that applies to
http://www.example.com:80/*
causes a static attribute to be returned."advices"
A map of advice names to their values, if any advice is returned according to applicable policies.
The
"advices"
field can provide hints regarding what AM needs to take the authorization decision.In the example, the policy that applies to resources with a query string requests that the subject be authenticated at an authentication level of at least 3.
Notice that with the
"advices"
field present, no"advices"
appear in the JSON response.{ "advices": { "AuthLevelConditionAdvice": [ "3" ] } }
You can use the query string parameters _prettyPrint=true
to make the output easier to read, and _fields=field-name[,field-name...]
to limit the fields returned in the output.