Users endpoints
With role-based access control (RBAC), you can manage local users and remote users
(created on a directory service). Use the users
endpoints to get lists of
users, create local users, and delete, revoke, and reinstate users in PE.
- GET /users: Get a list of all local and remote users.
- GET /users/<sid>: Get information about specific users.
- GET /users/current: Get information about the current authenticated user.
- GET /users/<sid>/tokens: Get a list of tokens for a user.
- POST /users: Create a local user.
- PUT /users/<sid>: Edit a user.
- DELETE /users/<sid>: Delete a user from the PE console.
- POST /command/users/add-roles: Assign roles to a user.
- POST /command/users/remove-roles: Remove roles from a user.
- POST /command/users/revoke: Revoke a user's PE access.
- POST /command/users/reinstate: Reinstate a revoked user.
Users endpoints keys
These keys are used with the RBAC API v1 users
endpoints.
Key | Definition | Example |
---|---|---|
id |
A UUID string identifying the user. | "4fee7450-54c7-11e4-916c-0800200c9a66" |
login |
A string used by the user to log in. Must be unique among users and groups. | "admin" |
email |
An email address string. Not currently utilized by any code in PE. | "hill@example.com" |
display_name |
The user's name as a string. | "Kalo Hill" |
role_ids |
An array of role IDs indicating roles to directly assign to the user. An empty array is valid. | [3 6 5] |
|
These flags indicate whether a user is remote and/or a
super user. For all users, is_group is always false . |
true or
false
|
is_revoked |
Setting this flag to true prevents
the user from accessing any routes until the flag is unset or the user's
password is reset via token. |
true or
false
|
last_login |
A timestamp in UTC-based ISO-8601 format (YYYY-MM-DDThh:mm:ssZ ) indicating when the
user last logged in. If the user has never logged in, this value is
null. |
"2014-05-04T02:32:00Z" |
inherited_role_ids (remote users
only) |
An array of role IDs indicating which roles a remote user inherits from their groups. | [9 1 3] |
group_ids (remote users only) |
An array of UUIDs indicating which groups a remote user inherits roles from. | ["3a96d280-54c9-11e4-916c-0800200c9a66"] |
identity_provider_id |
The UUID of the LDAP identity provider associated with the user. | "4522ca7e-5623-11ed-bdc3-0242ac120002" |
GET /users
Fetches all local and remote users, including the superuser. You can also query specific users by user ID. Authentication is required.
GET /users
endpoint
to query all users or specific users by ID; however, the v2 GET /users endpoint provides more query options and control
over the response content.Request format
curl "https://$(puppet config print server):4433/rbac-api/v1/users" -H "X-Authentication:$(puppet-access show)"
curl "https://$(puppet config print server):4433/rbac-api/v1/users?id=<SID>,<SID>" -H "X-Authentication:$(puppet-access show)"
Response format
[{
"id": "fe62d770-5886-11e4-8ed6-0800200c9a66",
"login": "Kalo",
"email": "kalohill@example.com",
"display_name": "Kalo Hill",
"role_ids": [1,2,3...],
"is_group" : false,
"is_remote" : false,
"is_superuser" : true,
"is_revoked": false,
"last_login": "2014-05-04T02:32:00Z"
},{
"id": "07d9c8e0-5887-11e4-8ed6-0800200c9a66",
"login": "Jean",
"email": "jeanjackson@example.com",
"display_name": "Jean Jackson",
"role_ids": [2, 3],
"inherited_role_ids": [5],
"is_group" : false,
"is_remote" : true,
"is_superuser" : false,
"group_ids": ["2ca57e30-5887-11e4-8ed6-0800200c9a66"],
"is_revoked": false,
"last_login": "2014-05-04T02:32:00Z"
},{
"id": "1cadd0e0-5887-11e4-8ed6-0800200c9a66",
"login": "Amari",
"email": "amariperez@example.com",
"display_name": "Amari Perez",
"role_ids": [2, 3],
"inherited_role_ids": [5],
"is_group" : false,
"is_remote" : true,
"is_superuser" : false,
"group_ids": ["2ca57e30-5887-11e4-8ed6-0800200c9a66"],
"is_revoked": false,
"last_login": "2014-05-04T02:32:00Z"
}]
For information about keys in the response, refer to Users endpoints keys.
For information about error responses, refer to RBAC service errors.
GET /users/<sid>
Fetches information about specific users identified by subject ID (<sid>
). Authentication is required.
Request format
curl "https://$(puppet config print server):4433/rbac-api/v1/users/<SID>" -H "X-Authentication:$(puppet-access show)"
curl "https://$(puppet config print server):4433/rbac-api/v1/users?id=<SID>,<SID>" -H "X-Authentication:$(puppet-access show)"
Response format
{"id": "fe62d770-5886-11e4-8ed6-0800200c9a66",
"login": "Amari",
"email": "amariperez@example.com",
"display_name": "Amari Perez",
"role_ids": [1,2,3...],
"is_group" : false,
"is_remote" : false,
"is_superuser" : false,
"is_revoked": false,
"last_login": "2014-05-04T02:32:00Z"}
{"id": "07d9c8e0-5887-11e4-8ed6-0800200c9a66",
"login": "Jean",
"email": "jeanjackson@example.com",
"display_name": "Jean Jackson",
"role_ids": [2,3...],
"inherited_role_ids": [],
"is_group" : false,
"is_remote" : true,
"is_superuser" : false,
"group_ids": ["b28b8790-5889-11e4-8ed6-0800200c9a66"],
"is_revoked": false,
"last_login": "2014-05-04T02:32:00Z"}
For information about keys in the response, refer to Users endpoints keys.
For information about error responses, refer to RBAC service errors.
GET /users/current
Fetches data about the current authenticated user. The user's ID is assumed from the authentication context. Authentication is required.
Request format
curl "https://$(puppet config print server):4433/rbac-api/v1/users/current" -H "X-Authentication:$(puppet-access show)"
Response format
The response is the same as GET /users/<sid>.
GET /users/<sid>/tokens
Fetches a list of tokens for a given user. Authentication required.
Request format
https://$(puppet config print server):4433/rbac-api/v1/users/c97c716a-5f42-49d8-b5a4-d0888a879d21/tokens
Parameter | Definition |
---|---|
limit |
An integer specifying the maximum number of records to return. If omitted, all records are returned. |
offset |
Specify a zero-indexed integer to specify the index value of
the first record to return. If omitted, the default is position
0 (the first record). For
example, offset=5 would start
from the 6th record. |
order_by |
Specify one of the following strings to define the order in
which records are returned:
creation_date . |
order |
Determines the sort order as either ascending (asc ) or descending (desc ). If omitted, the default is
asc . |
curl 'https://$(puppet config print server):4433/rbac-api/v1/users/<SID>/tokens?limit=20' \
-H "X-Authentication:$(puppet-access show)"
Response format
The response is a JSON object describing each token and the pagination information from the request.
items
array. Each token
is represented as an object using these keys:-
id
: The token's ID -
creation_date
: The date and time the token was created in ISO-8601 format. -
expiration_date
: The date and time the token expires (or expired) in ISO-8601 format. -
last_active_date
: The date and time the token was last used in ISO-8601 format. -
client
: Client information. -
description
: Arbitrary description information. -
session_timeout
: An integer, present with a timeout (in minutes), if this is a session-based token. -
label
: A label, if one was supplied at creation. Refer to Set a token-specific label.
The pagination
object reiterates the query pameters
from the request as well as the total number of records available (regardless of
limit
or offset
).
{"items": [{
"id": <token_id>
"creation_date": <ISO-8601>,
"expiration_date": <ISO-8601>,
"last_active_date": <ISO-8601>,
"client": "",
"description": "",
"session_timeout": ,
"label": ""
}, ...
],
"pagination": {
"limit": 20,
"offset": 0,
"order_by": "creation_date",
"order": "asc"
"total": 25
}
}
Error response
If a user with the provided use ID doesn't exist, the endpoint returns a 404 Not Found response.
For other errors, refer to RBAC service errors.
POST /users
Create a local user. Authentication is required.
Request format
application/json
. The body must be a JSON object
using the following keys:-
email
: Specify the user's email address. -
display_name
: The user's name as you want it shown in the console. -
login
: The username for the user to use to login. -
role_ids
: An array of role IDs defining the roles that you want to assign to the new user. An empty array is valid, but the user can't do anything in PE if they are not assigned to any roles. -
password
: A password the user can use to login. For the password to work in the PE console, it must be at least six characters. This field is optional, however user accounts are not usable until a password is set. You can also use the Passwords endpoints to generate a password reset token the user can use to login for the first time.
curl -X POST 'https://$(puppet config print server):4433/rbac-api/v1/users' \
-H "X-Authentication: $(puppet-access show)" \
-H "Content-type: application/json" \
-d '{"login": "Kalo",
"email": "kalohill@example.com",
"display_name": "Kalo Hill",
"role_ids": [1123,6643,1218],
"password": "Welc0me!"}'
Response format
If creation is successful, the endpoint returns 201 Created with a location header pointing to the new resource.
Error responses
If the email or login for the user conflicts with an existing user's login, the endpoint returns a 409 Conflict response.
For other errors, refer to RBAC service errors.
PUT /users/<sid>
Replace the content of the specified user object. For example, you can update a user's email address or role assignments. Authentication is required.
Request format
When Forming RBAC API requests to this endpoint, the content type
is application/json
. The body must be a JSON object
using all keys supplied in the GET /users/<sid>
endpoint response, modified as needed to update the user. For descriptions of each
key, refer to Users endpoints keys. Not all keys can be
updated, such as last_login
.
The role_ids
array indicates the roles to assign to the user. An
empty role_ids
array removes all roles directly
assigned to the user.
{"id": "c8b2c380-5889-11e4-8ed6-0800200c9a66",
"login": "Amari",
"email": "amariperez@example.com",
"display_name": "Amari Perez",
"role_ids": [1, 2, 3],
"is_group" : false,
"is_remote" : false,
"is_superuser" : false,
"is_revoked": false,
"last_login": "2014-05-04T02:32:00Z"}
{"id": "3271fde0-588a-11e4-8ed6-0800200c9a66",
"login": "Jean",
"email": "jeanjackson@example.com",
"display_name": "Jean Jackson",
"role_ids": [4, 1],
"inherited_role_ids": [],
"group_ids: [],
"is_group" : false,
"is_remote" : true,
"is_superuser" : false,
"is_revoked": false,
"last_login": "2014-05-04T02:32:00Z"}
curl -X PUT 'https://$(puppet config print server):4433/rbac-api/v1/users/c97c716a-5f42-49d8-b5a4-d0888a879d21' \
-H "X-Authentication:$(puppet-access show)" \
-H "Content-type: application/json" \
-d '{"id": "c97c716a-5f42-49d8-b5a4-d0888a879d21",
"login": "replace-test",
"email": "replace-test@example.com",
"display_name": "Replaced User",
"role_ids": [],
"is_group": false,
"is_remote": false,
"is_superuser": false,
"is_revoked": false,
"last_login": "2014-05-04T02:32:00Z"}'
Response format
{"email":"replace-test@example.com",
"is_revoked":false,
"last_login":null,
"is_remote":false,
"login":"replace-test",
"is_superuser":false,
"id":"c97c716a-5f42-49d8-b5a4-d0888a879d21",
"role_ids":[],
"display_name":"Replaced User",
"is_group":false}
Error responses
If the user's login
user conflicts with an existing user login,
the endpoint returns a 409 Conflict response.
For other errors, refer to RBAC service errors.
DELETE /users/<sid>
Deletes the user with the specified ID, regardless of whether they are a user defined in PE RBAC (local) or a user defined by a directory service (remote). Authentication is required.
admin
user and the api_user
can't be deleted. The API user is for service-to-service authentication within PE. It cannot be used with the standard login, and it is only
available through certificate-based authentication. The RBAC allow list
identifies (by certname) the certificates you can use for API user authentication.Request format
curl -X DELETE "https://$(puppet config print server):4433/rbac-api/v1/users/76351f96-3d89-4947-bde9-bc3d86542839" \
-H "X-Authentication:$(puppet-access show)"
Response format
If the user is successfully deleted, the endpoint returns a 204 No Content response.
Error responses
If the requesting user (based on the authentication in the request) does not have the
users:edit
permission for the specified user, the endpoint returns a
403 Forbidden response.
If there is no user with the provided ID, the endpoint returns a 404 Not Found response.
For other errors, refer to RBAC service errors.
POST /command/users/add-roles
Assign roles to a user.
Request format
application/json
. The body must be a JSON object
using the following keys:-
user_id
: The ID of the user you want to assign roles to. -
role_ids
: An array of role IDs defining the roles that you want to assign to the user. An empty array is valid, but the user can't do anything in PE if they are not assigned to any roles.
{ "user_id": <user-id>, "role_ids":[1,2,3] }
curl -X POST 'https://$(puppet config print server):4433/rbac-api/v1/command/users/add-roles' \
-H "X-Authentication: $(puppet-access show)" \
-H "Content-type: application/json" \
-d '{"user_id": "c97c716a-5f42-49d8-b5a4-d0888a879d21", "role_ids": [1]}'
Response format
Returns 204 No Content if the roles are successfully assigned to the user.
For errors, refer to RBAC service errors.
POST /command/users/remove-roles
Remove roles from a user.
Request format
application/json
. The body must be a JSON object
using the following keys:-
user_id
: The ID of the user you want to remove roles from. -
role_ids
: An array of role IDs defining the roles that you want to remove from the user.
{ "user_id": <user-id>, "role_ids":[1,2,3] }
curl -X POST 'https://$(puppet config print server):4433/rbac-api/v1/command/users/remove-roles' \
-H "X-Authentication: $(puppet-access show)" \
-H "Content-type: application/json" \
-d '{"user_id": "c97c716a-5f42-49d8-b5a4-d0888a879d21", "role_ids": [1]}'
Response format
Returns 204 No Content if the user exists and the roles are successfully unassigned.
For errors, refer to RBAC service errors.
POST /command/users/revoke
Revoke a user's access to PE.
Request format
When Forming RBAC API requests to this endpoint, the content type
is application/json
. The body must be a JSON object
containing the user_id
key, which specifies the ID
of the user you want to revoke.
curl -X POST 'https://$(puppet config print server):4433/rbac-api/v1/command/users/revoke' \
-H "X-Authentication: $(puppet-access show)" \
-H "Content-type: application/json" \
-d '{"user_id": "c97c716a-5f42-49d8-b5a4-d0888a879d21"}'
Response format
Returns 204 No Content if the user is revoked successfully.
For errors, refer to RBAC service errors.
POST /command/users/reinstate
Reinstate a user after they have been revoked.
Request format
When Forming RBAC API requests to this endpoint, the content type
is application/json
. The body must be a JSON object
containing the user_id
key, which specifies the UUID
of the user you want to reinstate.
curl -X POST 'https://$(puppet config print server):4433/rbac-api/v1/command/users/reinstate' \
-H "X-Authentication: $(puppet-access show)" \
-H "Content-type: application/json" \
-d '{"user_id": "c97c716a-5f42-49d8-b5a4-d0888a879d21"}'
Response format
Returns 204 No Content if the user is successfully reinstated.
Returns 404 Not Found if the specified user doesn't exist.
For other errors, refer to RBAC service errors.