...
The UDMG Server REST API is implemented by a customized version of the waarp-gatewayd
server.
In addition to what is supported by the original version of the waarp-gatewayd v0.6.2 server, the following commands have been added for UDMG:
- PGP Key Management:
sb_pgp
- Audit Management:
sb_audit
Authentication
Only Local User Account authentication is supported for the REST API. LDAP authentication provided by the udmg-server daemon and provides all the operations that can be performed with the UDMG Client or with the UDMG Client.
Authentication
Only Local User Account authentication is supported for the REST API.
SSO and LDAP authentication is only used for the Graphical User Interface.See
Waarp Gateway REST API Authentication on how to give the credentials.
Common Operations
Refer to the original version of of REST requests is done using basic HTTP authentication.
This authentication scheme is done using the HTTP Authorization header. To authenticate, the client must:
Obtain user login and password
Build the user ID by concatenating the login, a colon (“:”) character and the password
Encode the obtained identifier in Base64
Prefix the encoded identifier with a declaration of the basic authentication scheme (“Basic”)
For example, if the user enters the name "Aladdin" and the password "open sesame", then the client must send the following header:
Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==
If the authentication of a request fails, the server will respond with an HTTP code .401 - Unauthorized
By default, the UDMG Server has only one "admin" user (password: "admin_password") with all rights, in order to allow the initial configuration of the gateway to be set up. For security reasons, it is strongly recommended when installing the gateway to create new users with more restricted rights, then to delete this "admin" user.
Common Operations
Refer to the original version of the waarp-gatewayd v0.57.1 server documentation for the common operations:
- Service Status
- User Management
- Transfer Management
- History Management
- Local Servers Management
- Remote Partners Management
- Rules Management
- Configuration Override
- Management
- History Management
- Local Servers Management
- Remote Partners Management
- Rules Management
- Configuration Override
UDMG Specific Operations
In addition to what is supported by the original version of the waarp-gatewayd v0.7.1 server, the following commands have been added for UDMG:
- PGP Key Management:
sb_pgp
- Audit Management:
sb_audit
- Business Service Management:
sb_businessservices
- User Group Management:
sb_usergroups
PGP Key Management
PGP key records can be stored in the UDMG database and retrieved with the CLI or the REST API to be used by scripts or by Universal Controller tasks without having to keep them in a local keyring.
...
Description | |
---|---|
URI | http://host_name:port/api/sb_pgp |
HTTP Method | POST |
Description | Adds a new pgp PGP key |
Example URI | http://localhost:808018080/api/sb_pgp |
Authentication | HTTP Basic |
Consume Content-Type | application/json |
Response Header | Location – The path to the newly created key |
Example | |
Properties |
Add Key: JSON Example
To create a public pgp PGP key, the syntax is a followas follows:
Example | JSON | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Example Request |
| ||||||||||
Example Response |
|
...
Property | UI Field Name | Description |
---|---|---|
name | Name | The name of the key, must be unique. |
pgp-name | PGP Name | The key user name. |
pgp-email | The associated email. | |
pgp-algo | PGP Algorithm | The algorithm that was used for creating the key (free text, for reference). |
valid-from | Start Date | The valid from date |
valid-to | End Date | The expiration date |
private-key | Private Key | The private key. It must be in ascii armored format. |
public-key | Public Key | The public key. It must be in ascii armored format. |
passphrase | Passphrase | The passphrase of the private key. |
comment | Comment | An additional comment to describe the pgp PGP key. |
List keys
Description | |
---|---|
URI | http://host_name:port/api/sb_pgp |
HTTP Method | GET |
Description | Displays a list of all keys meeting matching with the criteria below. The private key value is not returned. |
Example URI | http://localhost:808018080/api/sb_pgp |
Authentication | HTTP Basic |
Produce Content-Type | application/json |
URI Parameters | |
Example |
...
Description | |
---|---|
URI | http://host_name:port/api/sb_pgp/key_name |
HTTP Method | GET |
Description | Retrieves a PGP key details |
Example URI | http://localhost:808018080/api/sb_pgp/test1.pub |
Authentication | HTTP Basic |
Produce Content-Type | application/json |
Example |
...
Description | |
---|---|
URI | http://host_namename:port/api/sb_pgp/key_name |
HTTP Method | DELETE |
Description | Deletes the given key. |
Example URI | http://localhost:808018080/api/sb_pgp/test1.pub |
Authentication | HTTP Basic |
Audit Management
...
- Retrieves an audit record details.
Example
...
Example
Code Block |
---|
GET /api/sb_audit/1969 { "id": 1969, "action": "START", "table_name": "local_agents", "table_key": 86, "before": "{\"ID\":86,\"Owner\":\"mft-gw-0\",\"Name\":\"clibs_serv_ftp_server\",\"Address\":\"0.0.0.0:4060\",\"Protocol\":\"ftp\",\"Enabled\":true,\"RootDir\":\"clibs_ftp_dir\",\"ReceiveDir\":\"in\",\"SendDir\":\"out\",\"TmpReceiveDir\":\"tmp\",\"ProtoConfig\":{}}", "after": "", "status": "SUCCESS", "info": "", "user": 1, "date": "20222023-0605-20T0702T14:5456:1055.009859Z70779Z", "parent_id": "" } |