Get Passwordcomplexity Policy​
Returns the password complexity settings that should be used for the authenticated user. It is set either on an instance or organization level. This policy defines how the password should look.
Responses
- 200
- default
A successful response.
application/json
application/grpc
application/grpc-web+proto
Schema
Example (from schema)
Schema
policy object
{
"policy": {
"details": {
"sequence": "2",
"creationDate": "2024-03-27T10:05:48.548Z",
"changeDate": "2024-03-27T10:05:48.548Z",
"resourceOwner": "69629023906488334"
},
"minLength": "8",
"hasUppercase": true,
"hasLowercase": true,
"hasNumber": true,
"hasSymbol": true,
"isDefault": true
}
}
Schema
Example (from schema)
Schema
policy object
{
"policy": {
"details": {
"sequence": "2",
"creationDate": "2024-03-27T10:05:48.548Z",
"changeDate": "2024-03-27T10:05:48.548Z",
"resourceOwner": "69629023906488334"
},
"minLength": "8",
"hasUppercase": true,
"hasLowercase": true,
"hasNumber": true,
"hasSymbol": true,
"isDefault": true
}
}
Schema
Example (from schema)
Schema
policy object
{
"policy": {
"details": {
"sequence": "2",
"creationDate": "2024-03-27T10:05:48.549Z",
"changeDate": "2024-03-27T10:05:48.549Z",
"resourceOwner": "69629023906488334"
},
"minLength": "8",
"hasUppercase": true,
"hasLowercase": true,
"hasNumber": true,
"hasSymbol": true,
"isDefault": true
}
}
An unexpected error response.
application/json
application/grpc
application/grpc-web+proto
Schema
Example (from schema)
Schema
code int32
message string
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
Example (from schema)
Schema
code int32
message string
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
Schema
Example (from schema)
Schema
code int32
message string
details object[]
{
"code": 0,
"message": "string",
"details": [
{
"@type": "string"
}
]
}
GET /policies/passwords/complexity
Authorization
name: OAuth2type: oauth2scopes:openid
flows: { "authorizationCode": { "authorizationUrl": "$CUSTOM-DOMAIN/oauth/v2/authorize", "tokenUrl": "$CUSTOM-DOMAIN/oauth/v2/token", "scopes": { "openid": "openid" } } }
Request
Request
curl / cURL
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
python / requests
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
go / native
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
nodejs / axios
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
ruby / Net::HTTP
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
csharp / RestSharp
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
php / cURL
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
java / OkHttp
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'
powershell / RestMethod
curl -L -X GET 'https://$CUSTOM-DOMAIN/auth/v1/policies/passwords/complexity' \
-H 'Accept: application/json' \
-H 'Authorization: Bearer <TOKEN>'