Export Identity Sources for a specific Identity Template in the indicated Environment. This API is designed to support EXPORT (read) operations for Identity Sources.
Notice
Accessing the APIs is through a dedicated domain/URL, according to your PlainID Tenant LocationUsing HTML Encoded Special Characters
Use HTML encoded patterns when working with values that contain special characters like spaces, dashes, etc. Refer to this HTML URL Encoding Reference for a full list.
Important note about headers
Refer to the headers below to modify your cURL sample. Check if the following headers are in the sample, if not, ensure you add it to your API tool.
Headers
*Required| Header | Value | cURL Line |
|---|---|---|
| Accept | `application/json` | `-H "Accept:application/json"` |
cURL Sample Guidelines
In order for the relevant parameters to appear in the cURL sample, you can input the values in the interactive API console on the right in the Try It or Code Sample tabs. You can then copy the cURL sample from the Code Sample tab in the correct format.
For more details about Administration API Authentication, check out the Authentication APIs documentation
Provide your bearer token in the Authorization header when making requests to protected resources.
Example: Authorization: Bearer 123
The Environment ID can be found under the Details Tab in the Environment Settings.
The Identity Template ID. This can be found in the Details tab in the Identity Workspace Settings.
When set to true, the response includes Identity Sources that cannot be imported like REQUEST INPUTand EXTERNAL_OUTPUT.
Successful operation
{
"data": {
"sources": [
{
"sourceId": "REQUEST_INPUT",
"displayName": "PDP Request",
"description": null,
"sourceType": "REQUEST_INPUT",
"sourceMetaData": {
"logoUrl": null
}
},
{
"sourceId": "REQUEST_MAPPERS",
"displayName": "Request Mappers",
"description": null,
"sourceType": "REQUEST_MAPPERS",
"sourceMetaData": {
"logoUrl": null
}
},
{
"sourceId": "ds_users",
"displayName": "users1",
"description": null,
"sourceType": "EXTERNAL_INPUT",
"sourceMetaData": {
"logoUrl": null,
"paaGroupId": "TestPAA",
"viewName": "v_users"
}
},
{
"sourceId": "CALCULATED",
"displayName": "Calculated Functions",
"description": null,
"sourceType": "CALCULATED",
"sourceMetaData": {
"logoUrl": null
}
},
{
"sourceId": "s122432",
"displayName": "Table 1",
"description": null,
"sourceType": "EXTERNAL_OUTPUT",
"sourceMetaData": {
"logoUrl": null,
"fqp": "adminDB_public_TABLE1"
}
}
]
}
}Response payload for Identity Sources operations
List of Identity Sources
Identity Source
The unique identifier for the Identity Source
Display name for the source
Description of Source
Type of source
Additional metadata for the Identity Source
Source Logo URL
PAAGroup ID associated with the environment or tenant. PAA Groups at the Tenant level have a suffix of _GLOBAL. (for EXTERNAL_INPUT sources)
View associated with the source (for EXTERNAL_INPUT sources)
FQP - Full Qualified Path (e.g. DB.schema.Table) (for EXTERNAL_OUTPUT sources)
Unauthorized
Forbidden
Object not found
{
"errors": [
{
"code": "EMIT-003",
"id": "EQ7CMX",
"status": "404",
"name": "EnvironmentNotFoundError",
"message": "Environment: [2d4a0591-dfe4-45fb-8a69-d183f5c75c0d] doesn't exist"
}
]
}{
"errors": [
{
"code": "EMIT-002",
"id": "EQ7CMX",
"status": "404",
"name": "IdentityTemplateNotFoundError",
"message": "Identity Template: [User1] not found in Environment: [848aa1dd-3516-4dbe-b1bb-c32454302dc4], Hint: did you mean [User, Target]"
}
]
}Response object
Internal Server Error