Lagertha_API (0.1.3)

Download OpenAPI specification:Download

The Lagertha API is a comprehensive solution for managing encryption keys and performing encryption and decryption operations, dedicated to ensuring end-to-end encryption. This API enhances data security by handling all encryption processes client-side, thereby minimizing the exposure of sensitive data.

Auth

User Authentication Endpoint

Authenticates a user and returns an access_token ,refresh_token and open_id.

Roles

  • PUBLIC

Parameters

  • login: A string representing the user's login credentials.

  • password: A string representing the user's password.

  • application_id: A i32 representing the user's application id.

  • fingerprint: A string representing the user's unique device identifier.

  • code_2fa: An optional string representing the 6-digit Time-based One-Time Password (TOTP) if two-factor authentication is enabled.

Request Body schema: application/json
required
login
required
string
password
required
string
application_id
required
integer <int32>
fingerprint
required
string
code_2fa
string or null

Responses

Request samples

Content type
application/json
{
  • "login": "string",
  • "password": "string",
  • "application_id": 0,
  • "fingerprint": "string",
  • "code_2fa": "string"
}

Response samples

Content type
application/json
{
  • "access_token": "string",
  • "token_type": "string",
  • "refresh_token": "string",
  • "open_id": "string"
}

User Refresh Authentication Endpoint

Refresh user Authentication and returns an access_token ,refresh_token and open_id.

Roles

  • PUBLIC

Parameters

  • refresh_token: A string representing the user's refresh token.

  • application_id: A i32 representing the user's application id.

  • fingerprint: A string representing the user's unique device identifier.

Request Body schema: application/json
required
refresh_token
required
string
application_id
required
integer <int32>
fingerprint
required
string

Responses

Request samples

Content type
application/json
{
  • "refresh_token": "string",
  • "application_id": 0,
  • "fingerprint": "string"
}

Response samples

Content type
application/json
{
  • "access_token": "string",
  • "token_type": "string",
  • "refresh_token": "string",
  • "open_id": "string"
}

Oauth

Requests a temporary authorization code for a user account.

Initiates the authorization process for a ROLE_ADMIN to obtain a temporary authorization code on behalf of a ROLE_USER.

This endpoint assumes that the ROLE_ADMIN is already authenticated. The ROLE_ADMIN specifies the user account for which the authorization is requested and provides a unique state for this session.

Roles

  • ROLE_ADMIN

Parameters

  • client_id: A string representing the unique identifier (user id) of the user account for which the authorization is requested.

  • state: A string representing a unique state value to maintain state between the request and callback.

Authorizations:
ApiKeyAuth
query Parameters
client_id
required
string
state
required
string

Responses

Response samples

Content type
application/json
{
  • "authorization_code": "string"
}

Exchanges authorization code for an access token.

This endpoint allows ROLE_USER to exchange the authorization code, obtained by ROLE_ADMIN, for an access token. The request must include the original state value for validation.

Roles

  • PUBLIC

Parameters

  • authorization_code: A string given by the server to exchange to an lagertha access token .

  • state: A string representing a unique state value to maintain state between the request and callback (provided by server).

  • fingerprint: A unique device authentifier

  • code_2fa: If MFA is acticated, provide the 6 number T-otp code

Request Body schema: application/json
required
authorization_code
required
string
state
required
string
fingerprint
required
string
code_2fa
string or null

Responses

Request samples

Content type
application/json
{
  • "authorization_code": "string",
  • "state": "string",
  • "fingerprint": "string",
  • "code_2fa": "string"
}

Response samples

Content type
application/json
{
  • "access_token": "string",
  • "token_type": "string",
  • "refresh_token": "string",
  • "open_id": "string"
}

Oidc

Verifies an OpenID Connect Token.

This endpoint verifies the validity of an OpenID Connect Token. It checks the signature and expiration of the token. If valid, it returns basic information about the user.

Roles

  • ROLE_ADMIN

Parameters

  • open_id_token: A string representing the OpenID Connect Token to be verified.
Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
open_id_token
required
string

Responses

Request samples

Content type
application/json
{
  • "open_id_token": "string"
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "email": "string",
  • "firstname": "string",
  • "lastname": "string",
  • "login": "string",
  • "roles": [
    ],
  • "created_at": "string"
}

Applications

Update Application

This endpoint allows users with the ROLE_SUPER_ADMIN permission to update an existing application.

Roles

  • ROLE_SUPER_ADMIN

Parameters

  • id: A i32 representing the id of the target application.

  • name: An optionnal String represanting the Updated Application Name

  • contact_email: An optionnal String represanting the Updated Application contact email

Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
id
required
integer <int32>
name
string or null
contact_email
string or null

Responses

Request samples

Content type
application/json
{
  • "id": 0,
  • "name": "string",
  • "contact_email": "string"
}

Response samples

Content type
application/json
{
  • "id": 0,
  • "name": "string",
  • "users_number": 0,
  • "keys_number": 0,
  • "is_system": true,
  • "contact_email": "string",
  • "created_at": "string"
}

Create a New Application

This endpoint allows users with the ROLE_SUPER_ADMIN permission to create a new application.

Roles

  • ROLE_SUPER_ADMIN

Parameters

  • name: A String representing the new application name.

  • contact_email: A String representing the new application contact email

Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
name
required
string
contact_email
required
string

Responses

Request samples

Content type
application/json
{
  • "name": "string",
  • "contact_email": "string"
}

Response samples

Content type
application/json
{
  • "id": 0,
  • "name": "string",
  • "users_number": 0,
  • "keys_number": 0,
  • "is_system": true,
  • "contact_email": "string",
  • "created_at": "string"
}

Delete Application

This endpoint allows users with the ROLE_SUPER_ADMIN permission to delete an existing application.

Roles

  • ROLE_SUPER_ADMIN

Parameters

  • application_id: The ID of the application to be deleted.
Authorizations:
ApiKeyAuth
path Parameters
application_id
required
integer <int32>

Responses

Response samples

Content type
application/json
{
  • "code": 0,
  • "message": "string"
}

Users

Create a new user (public)

This endpoint allows the creation of a new user with the role ROLE_USER.

This endpoint is publicly accessible and does not require any authentication.

The created user (ROLE_VALIDATION) must validate their account to end the process

Roles

  • PUBLIC

Parameters

  • email: A String representing the email of the user

  • password: A String representing the strong user password (must be min length 8, at least 1 lowercase, least 1 uppercase, at least 1 number )

  • firstname: A String representing the user firstname

  • lastname: A String representing the user lastname

  • login: A String representing the user login (must be unique for the givent application)

  • application_id: A number representing the application id

Request Body schema: application/json
required
email
required
string
password
required
string
firstname
required
string
lastname
required
string
login
required
string
application_id
required
integer <int32>

Responses

Request samples

Content type
application/json
{
  • "email": "string",
  • "password": "string",
  • "firstname": "string",
  • "lastname": "string",
  • "login": "string",
  • "application_id": 0
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "email": "string",
  • "firstname": "string",
  • "lastname": "string",
  • "login": "string",
  • "roles": [
    ],
  • "created_at": "string"
}

Validate user account

This endpoint allows users with the ROLE_VALIDATION permission to validate a user account by providing a validation code.

This endpoint requires authentication and the ROLE_VALIDATION role. It accepts a validation code to validate a user account.

If the validation is successful, it returns basic information about the user.

Roles

  • ROLE_VALIDATION

Parameters

  • validation_code: A string representing the validation code.
Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
validation_code
required
string

Responses

Request samples

Content type
application/json
{
  • "validation_code": "string"
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "email": "string",
  • "firstname": "string",
  • "lastname": "string",
  • "login": "string",
  • "roles": [
    ],
  • "created_at": "string"
}

Create a new user (admin, super admin)

This endpoint allows the creation of a new user with the role ROLE_USER or ROLE_ADMIN.

This endpoint require to be authenticate.

Roles

  • ROLE_SUPER_ADMIN

  • ROLE_ADMIN

Parameters

  • email: A String representing the email of the user

  • password: An Optional String representing the strong user password (must be min length 8, at least 1 lowercase, least 1 uppercase, at least 1 number )

  • firstname: A String representing the user firstname

  • lastname: A String representing the user lastname

  • login: A String representing the user login (must be unique for the givent application)

  • application_id: A number representing the application id (ignore if ROLE_ADMIN)

  • is_admin: A boolean representing the role of the future user (true -> ROLE_ADMIN, false -> ROLE_USER)

Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
email
required
string
password
string or null
firstname
required
string
lastname
required
string
login
required
string
application_id
required
integer <int32>
is_admin
required
boolean

Responses

Request samples

Content type
application/json
{
  • "email": "string",
  • "password": "string",
  • "firstname": "string",
  • "lastname": "string",
  • "login": "string",
  • "application_id": 0,
  • "is_admin": true
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "email": "string",
  • "firstname": "string",
  • "lastname": "string",
  • "login": "string",
  • "roles": [
    ],
  • "created_at": "string"
}

Request a Password Reset Code

This endpoint allows users to request a temporary validation code for resetting their password.

This endpoint is publicly accessible and does not require authentication.

It accepts the user's login and application ID to send a temporary validation code to the user's registered email address for password reset purposes.

Roles

  • PUBLIC

Parameters

  • login: A string representing the user's login.

  • application_id: A string representing the application ID.

Request Body schema: application/json
required
login
required
string
application_id
required
integer <int32>

Responses

Request samples

Content type
application/json
{
  • "login": "string",
  • "application_id": 0
}

Response samples

Content type
application/json
{
  • "code": 0,
  • "message": "string"
}

Reset Password

This endpoint allows users to reset their password using a temporary validation code.

This endpoint is publicly accessible and does not require authentication.

It accepts the user's login, application ID, validation code, and the new password to reset the user's password.

Roles

  • PUBLIC

Parameters

  • login: A string representing the user's login.

  • application_id: A string representing the application ID.

  • code: A string representing the validation code.

  • new_password: A string representing the new password.

Request Body schema: application/json
required
login
required
string
application_id
required
integer <int32>
code
required
string
new_password
required
string

Responses

Request samples

Content type
application/json
{
  • "login": "string",
  • "application_id": 0,
  • "code": "string",
  • "new_password": "string"
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "email": "string",
  • "firstname": "string",
  • "lastname": "string",
  • "login": "string",
  • "roles": [
    ],
  • "created_at": "string"
}

Update User Password

This endpoint allows users with the roles ROLE_ADMIN, ROLE_SUPER_ADMIN, or ROLE_USER to update their password.

This endpoint requires authentication.

Admin users with ROLE_ADMIN can update passwords for users with the role ROLE_USER within their applications.

Users with ROLE_USER or ROLE_SUPER_ADMIN can update their own passwords.

Roles

  • ROLE_ADMIN

  • ROLE_SUPER_ADMIN

  • ROLE_USER

Parameters

  • user_id: A string representing the UUID of the user whose password is being updated.

  • password: A string representing the new password.

Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
user_id
required
string
password
required
string

Responses

Request samples

Content type
application/json
{
  • "user_id": "string",
  • "password": "string"
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "email": "string",
  • "firstname": "string",
  • "lastname": "string",
  • "login": "string",
  • "roles": [
    ],
  • "created_at": "string"
}

Delete User

This endpoint allows users with the ROLE_SUPER_ADMIN permission to delete any user, while all other users are only authorized to delete their own accounts.

Users with the ROLE_SUPER_ADMIN role can delete any user account.

Users with ROLE_ADMIN or ROLE_USER roles can only delete their own accounts.

The endpoint accepts the user's ID and performs the deletion operation.

Roles

  • ROLE_ADMIN

  • ROLE_SUPER_ADMIN

  • ROLE_USER

Parameters

  • user_id: A string representing the UUID of the user to be deleted.
Authorizations:
ApiKeyAuth
path Parameters
user_id
required
string

Responses

Response samples

Content type
application/json
{
  • "code": 0,
  • "message": "string"
}

Get 2FA Code

If 2FA is not enabled, this endpoint generates and returns a unique url to activate 2FA.

This endpoint requires authentication. It checks if 2FA is not already activated for the user and, if not, generates a unique Time-based One-Time Password (TOTP) url to activate 2FA.

Roles

  • ROLE_USER

  • ROLE_ADMIN

  • ROLE_SUPER_ADMIN

Authorizations:
ApiKeyAuth

Responses

Response samples

Content type
application/json
{
  • "totp_url": "string"
}

Enable 2FA Authentication

This endpoint enables 2FA authentication on the user's account.

This endpoint requires authentication.

It accepts a TOTP code and a flag to activate or deactivate 2FA for the user's account.

Roles

  • ROLE_USER

  • ROLE_ADMIN

  • ROLE_SUPER_ADMIN

Parameters

  • code: A string representing the TOTP code.

  • is_activate: A boolean indicating whether to activate or deactivate 2FA.

Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
is_activate
required
boolean
code
required
string

Responses

Request samples

Content type
application/json
{
  • "is_activate": true,
  • "code": "string"
}

Response samples

Content type
application/json
{
  • "code": 0,
  • "message": "string"
}

Clusters

Create a New Cluster

Allows users with ROLE_USER or ROLE_ADMIN to create a new cluster.

The user must be authenticated and authorized to perform this action.

Roles

  • ROLE_ADMIN

  • ROLE_USER

Parameters

  • name: A string representing the name of the cluster.

  • description: A Optional string providing a description of the cluster.

  • memberships: An array of strings representing the UUIDs of the users to be added.

Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
name
required
string
description
string or null
memberships
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "name": "string",
  • "description": "string",
  • "memberships": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "name": "string",
  • "description": "string",
  • "created_at": "string"
}

Add Members to a Cluster

Adds a list of users as members of the specified cluster. This operation can be performed by ROLE_ADMIN on any cluster within their application, and by ROLE_USER on any cluster they have created.

Roles

  • ROLE_ADMIN

  • ROLE_USER

Parameters

  • cluster_id: A string representing the UUID of the cluster.

  • memberships: An array of strings representing the UUIDs of the users to be added.

Authorizations:
ApiKeyAuth
path Parameters
cluster_id
required
string
Request Body schema: application/json
required
memberships
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "memberships": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "name": "string",
  • "description": "string",
  • "created_at": "string"
}

Remove Members from a Cluster

Removes a list of users from the specified cluster. This operation can be performed by ROLE_ADMIN on any cluster within their application, and by ROLE_USER on any cluster they have created.

Roles

  • ROLE_ADMIN

  • ROLE_USER

Parameters

  • cluster_id: A string representing the UUID of the cluster.

  • memberships: An array of strings representing the UUIDs of the users to be removed.

Authorizations:
ApiKeyAuth
path Parameters
cluster_id
required
string
Request Body schema: application/json
required
memberships
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "memberships": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "name": "string",
  • "description": "string",
  • "created_at": "string"
}

Add Sentinels to a Cluster

Adds a list of Sentinels to the specified cluster. This operation can be performed by ROLE_ADMIN on any cluster within their application, and by ROLE_USER on any cluster they have created.

Roles

  • ROLE_ADMIN

  • ROLE_USER

Parameters

  • cluster_id: A string representing the UUID of the cluster.

  • sentinels: An array of strings representing the UUIDs of the sentinels to be added.

Authorizations:
ApiKeyAuth
path Parameters
cluster_id
required
string
Request Body schema: application/json
required
sentinels
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "sentinels": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "name": "string",
  • "description": "string",
  • "created_at": "string"
}

Remove Sentinels from a Cluster

Removes a list of Sentinels from the specified cluster. This operation can be performed by ROLE_ADMIN on any cluster within their application, and by ROLE_USER on any cluster they have created.

Roles

  • ROLE_ADMIN

  • ROLE_USER

Parameters

  • cluster_id: A string representing the UUID of the cluster.

  • sentinel_ids: An array of strings representing the UUIDs of the sentinels to be removed.

Authorizations:
ApiKeyAuth
path Parameters
cluster_id
required
string
Request Body schema: application/json
required
sentinels
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "sentinels": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "name": "string",
  • "description": "string",
  • "created_at": "string"
}

Add Anonymous Sentinels to a Cluster

Adds a list of anonymous Sentinels as members of the specified cluster. This operation can be performed by ROLE_ADMIN on any cluster within their application, and by ROLE_USER on any cluster they have created.

Roles

  • ROLE_ADMIN

  • ROLE_USER

Parameters

  • cluster_id: A string representing the UUID of the cluster.

  • anonymous_sentinels: An array of strings representing the UUIDs of the anonymous sentinels to be added.

Authorizations:
ApiKeyAuth
path Parameters
cluster_id
required
string
Request Body schema: application/json
required
anonymous_sentinels
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "anonymous_sentinels": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "name": "string",
  • "description": "string",
  • "created_at": "string"
}

Remove Anonymous Sentinels from a Cluster

Removes a list of anonymous Sentinels from the specified cluster. This operation can be performed by ROLE_ADMIN on any cluster within their application, and by ROLE_USER on any cluster they have created.

Roles

  • ROLE_ADMIN

  • ROLE_USER

Parameters

  • cluster_id: A string representing the UUID of the cluster.

  • anonymous_sentinels: An array of strings representing the UUIDs of the anonymous sentinels to be removed.

Authorizations:
ApiKeyAuth
path Parameters
cluster_id
required
string
Request Body schema: application/json
required
anonymous_sentinels
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "anonymous_sentinels": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "name": "string",
  • "description": "string",
  • "created_at": "string"
}

Delete a Cluster

Deletes the specified cluster based on its unique identifier. Users with ROLE_ADMIN can delete any cluster within their application. Users with ROLE_USER can delete clusters only if they are the creators of those clusters.

Roles

  • ROLE_ADMIN

  • ROLE_USER

Parameters

  • cluster_id: A string representing the UUID of the cluster to be deleted.
Authorizations:
ApiKeyAuth
path Parameters
cluster_id
required
string

Responses

Response samples

Content type
application/json
{
  • "code": 0,
  • "message": "string"
}

Get Cluster Users

Retrieves a list of users who are members of the specified cluster. This operation can be performed by ROLE_ADMIN on any cluster within their application.

Roles

  • ROLE_ADMIN

Parameters

  • cluster_id: A string representing the UUID of the cluster.

  • page: An optional integer representing the page number for pagination (default: 1)

  • page_size: An optional integer representing the number of items per page for pagination. (default: 10)

Authorizations:
ApiKeyAuth
path Parameters
cluster_id
required
string
query Parameters
page
integer or null <uint> >= 0
page_size
integer or null <uint> >= 0

Responses

Response samples

Content type
application/json
{
  • "items": [
    ],
  • "total_items": 0,
  • "page": 0,
  • "page_size": 0,
  • "has_next": true,
  • "has_prev": true
}

Sentinels

Create a New Sentinel

Allows users with ROLE_USER to create a new sentinel. The user must be authenticated and authorized to perform this action.

Roles

  • ROLE_USER

Parameters

  • clusters: An array of strings representing the UUIDs of the clusters to be added.
Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
clusters
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "clusters": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "key_size": "string",
  • "cipher": "string",
  • "sum": "string"
}

Get Sentinel

Allows users with ROLE_USER to retrieve a sentinel by its ID. The user must be authenticated and authorized to perform this action.

Roles

  • ROLE_USER

Parameters

  • sentinel_id: A string representing the UUID of the sentinel to be retrieved.
Authorizations:
ApiKeyAuth
path Parameters
sentinel_id
required
string

Responses

Response samples

Content type
application/json
{
  • "id": "string",
  • "key_size": "string",
  • "cipher": "string",
  • "sum": "string"
}

Delete a Sentinel

Allows users with ROLE_USER to delete a sentinel. The user must be authenticated and authorized to perform this action.

Roles

  • ROLE_USER

Parameters

  • sentinel_id: A string representing the UUID of the sentinel to be deleted.
Authorizations:
ApiKeyAuth
path Parameters
sentinel_id
required
string

Responses

Response samples

Content type
application/json
{
  • "code": 0,
  • "message": "string"
}

Anonymous_Sentinels

Create a New Anonymous Sentinel

Allows users with ROLE_USER to create a new Anonymous Sentinel. The user must be authenticated and authorized to perform this action.

Roles

  • ROLE_USER

Parameters

  • clusters: An array of strings representing the UUIDs of the clusters to be added.
Authorizations:
ApiKeyAuth
Request Body schema: application/json
required
clusters
required
Array of strings

Responses

Request samples

Content type
application/json
{
  • "clusters": [
    ]
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "secret_key": "string",
  • "sum": "string",
  • "key_size": "string"
}

Create a New Anonymous Sentinel (public)

Allows public users to create a new Anonymous Sentinel.

Roles

  • PUBLIC
Request Body schema: application/json
required
application_id
required
integer <int32>

Responses

Request samples

Content type
application/json
{
  • "application_id": 0
}

Response samples

Content type
application/json
{
  • "id": "string",
  • "public_key": "string",
  • "sum": "string",
  • "key_size": "string"
}

Get Anonymous Sentinel public key

This Endpoint allow to retreive a the public key of the anonymous sentinel by its ID

Roles

  • PUBLIC

Parameters

  • anonymous_sentinel_id: A string representing the UUID of the Anonymous sentinel to be retrieved.
path Parameters
anonymous_sentinel_id
required
string

Responses

Response samples

Content type
application/json
{
  • "id": "string",
  • "public_key": "string",
  • "sum": "string",
  • "key_size": "string"
}

Get Anonymous Sentinel

Allows users with ROLE_USER to retrieve a Anonymous sentinel by its ID. The user must be authenticated and authorized to perform this action.

Roles

  • ROLE_USER

Parameters

  • anonymous_sentinel_id: A string representing the UUID of the Anonymous sentinel to be retrieved.
Authorizations:
ApiKeyAuth
path Parameters
anonymous_sentinel_id
required
string

Responses

Response samples

Content type
application/json
{
  • "id": "string",
  • "secret_key": "string",
  • "sum": "string",
  • "key_size": "string"
}

Delete an Anonymous Sentinel

Allows users with ROLE_USER to delete an Anonymous sentinel. The user must be authenticated and authorized to perform this action.

Roles

  • ROLE_USER

Parameters

  • anonymous_sentinel_id: A string representing the UUID of the Anonymous sentinel to be deleted.
Authorizations:
ApiKeyAuth
path Parameters
anonymous_sentinel_id
required
string

Responses

Response samples

Content type
application/json
{
  • "code": 0,
  • "message": "string"
}

System

Retrieve the current system version, API name, and license information

Users can get the current version, name, API mode, license number, license expiration date, and license name of the Lagertha_API system.

Roles

  • PUBLIC

Responses

Response samples

Content type
application/json
{
  • "version": "string",
  • "name": "string",
  • "api_mode": "string",
  • "license_number": "string",
  • "license_expiration": "string",
  • "license_name": "string"
}

Retrieve the current system statistics

Users can get the current number of users, applications, sentinels, and anonymous sentinels in the Lagertha_API system.

Roles

  • ROLE_SUPER_ADMIN
Authorizations:
ApiKeyAuth

Responses

Response samples

Content type
application/json
{
  • "nb_users": 0,
  • "nb_applications": 0,
  • "nb_sentinels": 0,
  • "nb_anonymous_sentinels": 0
}