Authorization
Authorization
RequiredBearer <token>< Project ID >:< Management Key > as bearer
In: header
Request Body
application/json
Requiredid
stringname
stringdescription
stringroleNames
we want to differentiate between empty and nil so we use google.protobuf.Value
keyTenants
unknownRepresents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.
customClaims
objectpermittedIps
unknownRepresents a dynamically typed value which can be either null, a number, a string, a boolean, a recursive struct value, or a list of values.
OK
Create Access Key POST
### Create an access key, using a valid management key. This API endpoint allows administrators to create an access key. During the creation of the access key, you can set the name, expiration time, roles and tenant:role pairs to associated with the key. ### Next Steps Once you have the access key, you can utilize it to configure external items such as [SCIM](/api/scimmanagement/), or use it to [exchange for a JWT](/api/access-keys/exchange-key). ### See also - See [Access Key Management](/access-keys) for further details on managing access keys. ### Endpoint Authentication Use authorization bearer header with the following format: `Authorization: Bearer <ProjectId:ManagementKey>`
Activate Access Key POST
### Activate an existing access key, using a valid management key. This API endpoint allows administrators to activate an existing access key. ### Next Steps Once you have reactivated the access key, you can utilize it to configure external items such as [SCIM](/api/scimmanagement/), or use it to [exchange for a JWT](/api/access-keys/exchange-key). ### See also - See [Access Key Management](/access-keys) for further details on managing access keys. ### Endpoint Authentication Use authorization bearer header with the following format: `Authorization: Bearer <ProjectId:ManagementKey>`