General Process for Using the REST API
In general, your client interacts with the threat defense device using the following iterative process:
-
Obtain an access token to authenticate your API calls. See Overview of the API Client Authentication Process.
-
Except when simply reading data, build a JSON payload.
-
Transmit the JSON payload using an HTTPS call for the Universal Resource Locater (URL) for the resource.
-
Consume the returned JSON response.
-
If you make configuration changes, deploy the changes. See Deploying Configuration Changes.