policies_event_matcher_list
GET/api/v3//policies/event_matcher/
Event Matcher Policy Viewset
Request
Query Parameters
Possible values: [authorize_application
, configuration_error
, custom_
, email_sent
, flow_execution
, impersonation_ended
, impersonation_started
, invitation_used
, login
, login_failed
, logout
, model_created
, model_deleted
, model_updated
, password_set
, policy_exception
, policy_execution
, property_mapping_exception
, secret_rotate
, secret_view
, source_linked
, suspicious_request
, system_exception
, system_task_exception
, system_task_execution
, update_available
, user_write
]
Match created events with this action type. When left empty, all action types will be matched.
Which field to use when ordering the results.
A page number within the paginated result set.
Number of results to return per page.
A search term.
Responses
- 200
- 400
- 403
- application/json
- Schema
- Example (from schema)
Schema
pagination
object
required
results
object[]
required
{
"pagination": {
"next": 0,
"previous": 0,
"count": 0,
"current": 0,
"total_pages": 0,
"start_index": 0,
"end_index": 0
},
"results": [
{
"pk": "3fa85f64-5717-4562-b3fc-2c963f66afa6",
"name": "string",
"execution_logging": true,
"component": "string",
"verbose_name": "string",
"verbose_name_plural": "string",
"meta_model_name": "string",
"bound_to": 0,
"action": "login",
"client_ip": "string",
"app": "authentik.tenants",
"model": "authentik_tenants.domain"
}
]
}
- application/json
- Schema
- Example (from schema)
Schema
{
"non_field_errors": [
"string"
],
"code": "string"
}
- application/json
- Schema
- Example (from schema)
Schema
{
"detail": "string",
"code": "string"
}
- curl
- python
- go
- nodejs
- ruby
- csharp
- php
- java
- powershell
- CURL
curl -L -X GET '/api/v3/policies/event_matcher/' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'