General Process for Using the REST API

General Process for Using the REST API

In general, your client interacts with the threat defense device using the following iterative process:

  1. Obtain an access token to authenticate your API calls. See Overview of the API Client Authentication Process.

  2. Except when simply reading data, build a JSON payload.

  3. Transmit the JSON payload using an HTTPS call for the Universal Resource Locater (URL) for the resource.

  4. Consume the returned JSON response.

  5. If you make configuration changes, deploy the changes. See Deploying Configuration Changes.