List Password Policies
GEThttps://sailpoint.api.identitynow.com/v3/password-policies
This gets list of all Password Policies. Requires role of ORG_ADMIN
Request
Query Parameters
Possible values: <= 250
Max number of results to return. See V3 API Standard Collection Parameters for more information.
250
Offset into the full result set. Usually specified with limit to paginate through the results. See V3 API Standard Collection Parameters for more information.
0
If true it will populate the X-Total-Count response header with the number of results that would be returned if limit and offset were ignored.
Since requesting a total count can have a performance impact, it is recommended not to send count=true if that value will not be used.
See V3 API Standard Collection Parameters for more information.
false
Responses
- 200
- 400
- 401
- 403
- 429
- 500
List of all Password Policies.
- application/json
- Schema
- Example (auto)
- Example
Schema
- Array [
- ]
The password policy Id.
2c91808e7d976f3b017d9f5ceae440c8
Description for current password policy.
Information about the Password Policy
The name of the password policy.
PasswordPolicy Example
Date the Password Policy was created.
1639056206564
Date the Password Policy was updated.
1939056206564
The number of days before expiration remaninder.
45
The minimun length of account Id. By default is equals to -1.
4
The minimun length of account name. By default is equals to -1.
6
Maximum alpha. By default is equals to 0.
5
MinCharacterTypes. By default is equals to -1.
5
Maximum length of the password.
25
Minimum length of the password. By default is equals to 0.
8
Maximum repetition of the same character in the password. By default is equals to -1.
3
Minimum amount of lower case character in the password. By default is equals to 0.
8
Minimum amount of numeric characters in the password. By default is equals to 0.
8
Minimum amount of special symbols in the password. By default is equals to 0.
8
Minimum amount of upper case symbols in the password. By default is equals to 0.
8
Number of days before current password expires. By default is equals to 90.
8
Defines whether this policy is default or not. Default policy is created automatically when an org is setup. This field is false by default.
false
true
Defines whether this policy is enabled to expire or not. This field is false by default.
false
true
Defines whether this policy require strong Auth or not. This field is false by default.
false
true
Defines whether this policy require strong Auth of network or not. This field is false by default.
false
true
Defines whether this policy require strong Auth for untrusted geographies. This field is false by default.
false
true
Defines whether this policy uses account attributes or not. This field is false by default.
false
false
Defines whether this policy uses dictionary or not. This field is false by default.
false
false
Defines whether this policy uses identity attributes or not. This field is false by default.
false
false
Defines whether this policy validate against account id or not. This field is false by default.
false
false
Defines whether this policy validate against account name or not. This field is false by default.
false
true
List of sources IDs managed by this password policy.
["2c91808382ffee0b01830de154f14034","2f98808382ffee0b01830de154f12134"]
[
{
"id": "2c91808e7d976f3b017d9f5ceae440c8",
"description": "Information about the Password Policy",
"name": "PasswordPolicy Example",
"dateCreated": 1639056206564,
"lastUpdated": 1939056206564,
"firstExpirationReminder": 45,
"accountIdMinWordLength": 4,
"accountNameMinWordLength": 6,
"minAlpha": 5,
"minCharacterTypes": 5,
"maxLength": 25,
"minLength": 8,
"maxRepeatedChars": 3,
"minLower": 8,
"minNumeric": 8,
"minSpecial": 8,
"minUpper": 8,
"passwordExpiration": 8,
"defaultPolicy": true,
"enablePasswdExpiration": true,
"requireStrongAuthn": true,
"requireStrongAuthOffNetwork": true,
"requireStrongAuthUntrustedGeographies": true,
"useAccountAttributes": false,
"useDictionary": false,
"useIdentityAttributes": false,
"validateAgainstAccountId": false,
"validateAgainstAccountName": true,
"created": "string",
"modified": "string",
"sourceIds": [
"2c91808382ffee0b01830de154f14034",
"2f98808382ffee0b01830de154f12134"
]
}
]
[
{
"description": "Example Password Policy",
"id": "2c91808e7d976f3b017d9f5ceae440c8",
"name": "Example PP",
"dateCreated": 1639056206564,
"lastUpdated": 1662385430753,
"firstExpirationReminder": 90,
"accountIdMinWordLength": 3,
"accountNameMinWordLength": 3,
"maxLength": 0,
"maxRepeatedChars": 4,
"minAlpha": 1,
"minCharacterTypes": -1,
"minLength": 8,
"minLower": 0,
"minNumeric": 1,
"minSpecial": 0,
"minUpper": 0,
"passwordExpiration": 90,
"defaultPolicy": false,
"enablePasswdExpiration": false,
"requireStrongAuthn": false,
"requireStrongAuthOffNetwork": false,
"requireStrongAuthUntrustedGeographies": false,
"useAccountAttributes": false,
"useDictionary": false,
"useIdentityAttributes": false,
"validateAgainstAccountId": true,
"validateAgainstAccountName": true,
"sourceIds": [
"2c91808382ffee0b01830de154f14034",
"2c91808582ffee0c01830de36511405f"
]
},
{
"description": null,
"id": "2c91808780b8b8430180ff7a093f3bf2",
"name": "Password Policy 1 test",
"dateCreated": 1653553629503,
"lastUpdated": null,
"firstExpirationReminder": null,
"accountIdMinWordLength": -1,
"accountNameMinWordLength": -1,
"maxLength": 0,
"maxRepeatedChars": -1,
"minAlpha": 1,
"minCharacterTypes": -1,
"minLength": 8,
"minLower": 0,
"minNumeric": 1,
"minSpecial": 0,
"minUpper": 0,
"passwordExpiration": 90,
"defaultPolicy": false,
"enablePasswdExpiration": false,
"requireStrongAuthn": false,
"requireStrongAuthOffNetwork": false,
"requireStrongAuthUntrustedGeographies": false,
"useAccountAttributes": false,
"useDictionary": false,
"useIdentityAttributes": true,
"validateAgainstAccountId": false,
"validateAgainstAccountName": false,
"sourceIds": []
}
]
Client Error - Returned if the request body is invalid.
- application/json
- Schema
- Example (auto)
Schema
Fine-grained error code providing more detail of the error.
400.1 Bad Request Content
Unique tracking id for the error.
e7eab60924f64aa284175b9fa3309599
messages object[]
causes object[]
{
"detailCode": "400.1 Bad Request Content",
"trackingId": "e7eab60924f64aa284175b9fa3309599",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
],
"causes": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
]
}
Unauthorized - Returned if there is no authorization header, or if the JWT token is expired.
- application/json
- Schema
- Example (auto)
Schema
A message describing the error
JWT validation failed: JWT is expired
{
"error": "JWT validation failed: JWT is expired"
}
Forbidden - Returned if the user you are running as, doesn't have access to this end-point.
- application/json
- Schema
- Example (auto)
- 403
Schema
Fine-grained error code providing more detail of the error.
400.1 Bad Request Content
Unique tracking id for the error.
e7eab60924f64aa284175b9fa3309599
messages object[]
causes object[]
{
"detailCode": "400.1 Bad Request Content",
"trackingId": "e7eab60924f64aa284175b9fa3309599",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
],
"causes": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
]
}
An example of a 403 response object
{
"detailCode": "403 Forbidden",
"trackingId": "b21b1f7ce4da4d639f2c62a57171b427",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The server understood the request but refuses to authorize it."
}
]
}
Too Many Requests - Returned in response to too many requests in a given period of time - rate limited. The Retry-After header in the response includes how long to wait before trying again.
- application/json
- Schema
- Example (auto)
Schema
A message describing the error
Rate Limit Exceeded
{
"message": " Rate Limit Exceeded "
}
Internal Server Error - Returned if there is an unexpected error.
- application/json
- Schema
- Example (auto)
- 500
Schema
Fine-grained error code providing more detail of the error.
400.1 Bad Request Content
Unique tracking id for the error.
e7eab60924f64aa284175b9fa3309599
messages object[]
causes object[]
{
"detailCode": "400.1 Bad Request Content",
"trackingId": "e7eab60924f64aa284175b9fa3309599",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
],
"causes": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
]
}
An example of a 500 response object
{
"detailCode": "500.0 Internal Fault",
"trackingId": "b21b1f7ce4da4d639f2c62a57171b427",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "An internal fault occurred."
}
]
}
Authorization: oauth2
type: Personal Access Tokenscopes: idn:password-policy:read
- go
- powershellSailPoint SDK
- pythonSailPoint SDK
- csharp
- curl
- dart
- http
- java
- javascript
- kotlin
- c
- nodejs
- objective-c
- ocaml
- php
- r
- ruby
- rust
- shell
- swift
- NATIVE
package main
import (
"fmt"
"net/http"
"io"
)
func main() {
url := "https://sailpoint.api.identitynow.com/v3/password-policies"
method := "GET"
client := &http.Client {
}
req, err := http.NewRequest(method, url, nil)
if err != nil {
fmt.Println(err)
return
}
req.Header.Add("Accept", "application/json")
req.Header.Add("Authorization", "Bearer <TOKEN>")
res, err := client.Do(req)
if err != nil {
fmt.Println(err)
return
}
defer res.Body.Close()
body, err := io.ReadAll(res.Body)
if err != nil {
fmt.Println(err)
return
}
fmt.Println(string(body))
}