curl --request POST \
--url https://api.eda.prisme.ai/v2/workspaces/{workspaceId}/security/apikeys \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: application/json' \
--data '
{
"name": "<string>",
"rules": [
{
"action": "manage",
"subject": "apps",
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"conditions": {},
"priority": 123
}
]
}
'{
"apiKey": "<string>",
"subjectType": "<string>",
"subjectId": "<string>",
"rules": [
{
"action": "manage",
"subject": "apps",
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"conditions": {},
"priority": 123
}
],
"name": "<string>",
"disabled": true
}Create an api key
curl --request POST \
--url https://api.eda.prisme.ai/v2/workspaces/{workspaceId}/security/apikeys \
--header 'Authorization: Bearer <token>' \
--header 'Content-Type: application/json' \
--data '
{
"name": "<string>",
"rules": [
{
"action": "manage",
"subject": "apps",
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"conditions": {},
"priority": 123
}
]
}
'{
"apiKey": "<string>",
"subjectType": "<string>",
"subjectId": "<string>",
"rules": [
{
"action": "manage",
"subject": "apps",
"role": [
"<string>"
],
"inverted": true,
"reason": "<string>",
"conditions": {},
"priority": 123
}
],
"name": "<string>",
"disabled": true
}Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Workspace id
Show child attributes
The actions that we want to allow/deny
manage, create, read, update, delete, manage_permissions, manage_security, manage_repositories, read_app_dsul, get_usage, aggregate_search, execute, test apps, pages, files, events, workspaces, automations, secrets, roles, all The roles to which this rule is restricted
If true, will forbid instead of allow
Matching conditions written using a subset of MongoDB queries. This rule will take effect only if conditions match (or are empty). See https://casl.js.org/v5/en/guide/conditions-in-depth
Success Response
Show child attributes
The actions that we want to allow/deny
manage, create, read, update, delete, manage_permissions, manage_security, manage_repositories, read_app_dsul, get_usage, aggregate_search, execute, test apps, pages, files, events, workspaces, automations, secrets, roles, all The roles to which this rule is restricted
If true, will forbid instead of allow
Matching conditions written using a subset of MongoDB queries. This rule will take effect only if conditions match (or are empty). See https://casl.js.org/v5/en/guide/conditions-in-depth
Was this page helpful?