Rules

The following are Autonomous Identity rules endpoints:

GET Rule Stats

Get rules statistics.

Endpoint

/api/rules/info

Authorization

Bearer Token     <JWT-value>

Params

by       appOwner
user     patrick.murphy

Example Request

curl --location --request GET '/api/rules/info?by=appOwner&user=patrick.murphy \
  --header 'content-type: application/json'

Example Response

{
  "countRules": 4970,
  "countAssignments": 13085,
  "countApplications": 2,
  "countHighConfidence": 2351,
  "countMediumConfidence": 836,
  "countLowConfidence": 956,
  "applications": [
    {
      "app_id": "Ensuite Oracle DB",
      "app_name": "Ensuite Oracle DB",
      "countAssignments": 8678,
      "low": 1213,
      "medium": 1103,
      "high": 4905
    },
    {
      "app_id": "SAP Finance",
      "app_name": "SAP Finance",
      "countAssignments": 6816,
      "low": 1308,
      "medium": 1041,
      "high": 3515
    }
  ]
}
GET Rule Stats by Entt Owner

Get rules statistics by entitlement owners.

Endpoint

/api/rules/info

Authorization

Bearer Token     <JWT-value>

Params

by       enttOwner
user     david.elliott

Example Request

curl --location --request GET '/api/rules/info?by=enttOwner&user=david.elliott \
  --header 'content-type: application/json'
GET Rule Stats by App Owner

Get rules statistics by application owner.

Endpoint

/api/rules/info

Authorization

Bearer Token     <JWT-value>

Params

by       enttOwner
user     derick.hui

Example Request

curl --location --request GET '/api/rules/info?by=appOwner&user=derick.hui \
  --header 'content-type: application/json'
GET Rule Search

Get detailed rule information with optional filtering.

Endpoint

/api/rules

Authorization

Bearer Token    <JWT-value>

Example Request

curl --location --request GET '/api/rules?by=appOwner&user=patrick.murphy&filter[highConfidence]=true&filter[medConfidence]=true&filter[app_id][]=Gateway \
--header 'content-type: application/json'
GET Rule Search by Entt Owner

Get detailed rule information with optional filtering by entitlement owner.

Endpoint

/api/rules

Authorization

Bearer Token    <JWT-value>

Example Request

curl --location --request GET '/api/rules?by=enttOwner&user=david.elliott&filter[highConfidence]=true&filter[medConfidence]=true&filter[app_id][]=Gateway \
--header 'content-type: application/json'
GET Rule Search by App Owner

Get detailed rule information with optional filtering by application owner.

Endpoint

/api/rules

Authorization

Bearer Token    <JWT-value>

Example Request

curl --location --request GET '/api/rules?by=appOwner&user=derick.hui&filter[highConfidence]=true&filter[medConfidence]=true&filter[app_id][]=Gateway \
--header 'content-type: application/json'
POST Rule Decision

Update rule decisions.

Endpoint

/api/rules/decision

Authorization

Bearer Token        <JWT-value>

Body

{
    "rules": [
        {
            "entitlement": "AccessType : XMLP_ADMIN_II_NYC",
            "justification": [
                "0C_CHIEF_YES_NO_Yes",
                "0C_JOBCODE_NAME_Service Representitive II",
                "0C_MANAGER_NAME_Jonathan Baxter",
                "0C_USR_EMP_TYPE_Non-Employee"
            ]
        }
    ],
    "is_autocertify": false,
    "is_autorequest": false,
    "reason": "Goodbye, world."
}

Example Request

curl --location --request POST '/api/rules/decision' \
--header 'content-type: application/json' \
--data-raw '{
    "rules": [
        {
            "entitlement": "AccessType : XMLP_ADMIN_II_NYC",
            "justification": [
                "0C_CHIEF_YES_NO_Yes",
                "0C_JOBCODE_NAME_Service Representitive II",
                "0C_MANAGER_NAME_Jonathan Baxter",
                "0C_USR_EMP_TYPE_Non-Employee"
            ]
        }
    ],
    "is_autocertify": false,
    "is_autorequest": false,
    "reason": "Goodbye, world."
}'