Old UI
  • Documentation Platform
    • Technical Guide
      • Whitelisting
        • Whitelisting the Pictures on Microsoft Outlook Apps
      • Minimum Requirements
      • On-Premise Requirements
        • Restricting the Access to Portal According IP
          • How to Import SSL Certificates in IIS
        • Why does the disk on the server fill up fast?
      • Getting Started
      • Phishing Simulator
      • Awareness Educator
      • Incident Responder
        • How does investigation mechanism work?
          • Benefits of Phishing Incident Responder
          • Reverse Engineering Support
          • Privacy and Security
          • Audit
          • Integrations
        • API Settings
          • Configuration steps for Office 365: Microsoft Graph App Configuration
          • Exchange Mail Configuration
          • GSuite API Configuration Guide
          • Gsuite Mail Configration
        • Analysing Suspicious Emails
          • Starting an Automatic Incident Investigation
          • Starting a Manual Incident Investigation
          • Playbook
        • FAQ (Incident Responder&Phishing Reporter)
      • Phishing Reporter Add-In
        • Installation
        • Microsoft Defender Email Reporter Add-In
      • Email Threat Simulator (ETS)
        • Creating a Trusted Account for E-mail Security Tests
          • Restriction of the Authority of the Test Account
          • Restrict Email Address
          • Enable Mailbox Audit Logging for Test Account
        • Dashboard
        • Quick Scan
        • Advanced Scan
        • Interpretation of ETS Report
        • FAQ ( ETS)
      • Threat Intelligence
        • FAQ (Threat Intelligence)
      • Report Manager
        • Phishing Campaign Report List
          • Phishing Campaign Summary
          • Statistics
          • Opened Email
          • Clicked Link in The Phishing Campaign Email
          • Submitted Form
          • Opened Attachment
          • Phishing Reporter
          • Campaign No response
          • Email Delivery Report
          • Phishing User Compare
          • Departments
        • Training Campaign Reports
          • Training Summary
          • Training Statistics
          • Opened Training Email
          • Clicked Training Link
          • View Duration
          • No Response
          • Sending Report
          • Training User Compare
          • Exam
        • Users KPI
          • User-based Grade
          • Department-based Grade
          • Target Group based grade
          • Company-based grade
        • Advanced Reporting
      • Company
        • User Role Management
      • Advanced Settings
        • Allow Email Domains
        • White Labelling
        • LDAP Settings
        • SCIM Integrations
        • Notification Templates
          • Short Codes
          • Using Notification Templates
        • Data Anonymisation
      • Available for Option
      • API Guide
        • REST API for Incident Responder (IR) Operation
        • REST API for SSO Authentication
      • Diagnostic Tool
        • FAQ
    • Maintenance Tool
    • FAQ (All Modules)
      • Video Tutorials
        • Quick Start
        • Google Workspace API Configuration Guide
        • On Premise Requirement Checker Video
        • Phishing Reporter Installation & Deployment
Powered by GitBook
On this page
  1. Documentation Platform
  2. Technical Guide
  3. API Guide

REST API for SSO Authentication

PreviousREST API for Incident Responder (IR) OperationNextDiagnostic Tool

Last updated 2 years ago

API Authentication for 3. Party Organizations

This section will provide detailed guidance on how to authorize 3rd Party Organizations (Reseller or strategic partners) with Platform API keys.

Go to the Dashboard and follow the Company > Company List path and select the company you will authorise to use Platform. Then click the Edit icon in the Action column for the edit page.

On the Company Edit page, copy the Company API Key and OAuth ID values to use them for authorisation operations.

In order to create a Platform Authentication Key, you must fulfil the requests in the table below:

Title

Description

API URL

/api/Oauth/OAuthKeyGenerate?

Method

POST

Parameters

ApiKey= String = Company Api Key

OAuthID = String = Company OAuth ID

Email = String = User who will login to the system with API

ApiKey (String)

Company Api Key

OAuthID(String)

Company OAuth ID

Email(String)

The user who will login to the system with API

Table 1. Authentication Key Generating Table

3. For Party organizations, a request is sent to the Platform application as following, and an OAuthKey is created for the relevant user. This key is included in the response.

Example Request:

curl -XPOST -v -i 'https://dashboard.keepnetlabs.com/api/Oauth/OAuthKeyGenerate?ApiKey={ApiKey}&OAuthID={OAuthID}&Email={Email}'

Example Response:

Figure 1. Example Response

In order to login into the application, you must fulfil the requests in the table below.

Title

Description

Api URL

/api/Oauth/Authentication?

Method

GET

Parameters

ApiKey= String = Company Api Key

OAuthKey = String = 1. OAuth Key obtained on the previous table

Email = String = User Email address

Name = String = User Name information

Surname = String= User Surname information

ApiKey (String)

Company API Key

OAuthKey(String)

OAuthKey

Email(String)

The user who will login to the system with API

Name(String)

Name

Surname

Surname

Table 2. Platform OAuth Authentication Table

Example Request:

In order to perform the authentication process, send a GET request is via the relevant URL browser.

https://dashboard.keepnetlabs.com/api/Oauth/Authentication?apikey={ApiKey}&OAuthKey={OAuthKey}&Email={Email}&Name={Name}&Surname={Surname}

Result:

Following the Request process mentioned above, the user will be directed to dashboard.keepnetlabs.com and will be logged into the system automatically.