100s of Developer-Ready Specs

The Web’s Largest Free Online Open API Spec Library

Request a SpecSubmit a Spec
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Cisco ThousandEyes API v6

# Cisco ThousandEyes API (v6) Postman Collection This is a Postman collection and environment variables covering Cisco ThousandEyes v6 APIs. ## Cisco ThousandEyes ThousandEyes is the light that illuminates the path an application takes as it traversing infrastructure outside the four walls of the traditional enterprise network. When you can see and hence understand the path, you can assure the user experience is as expected, and know what to remediate when it isn’t. ## What's in the Postman collection - A Sandbox access is available [here](https://www.thousandeyes.com/signup/). - The collection correlates with the official ThousandEyes [API documentation](https://developer.thousandeyes.com/v6/). **ThousandEyes Endpoints** covered in this collection 1. Instant Tests 2. Tests 3. Test Data 4. Credentials 5. Endpoint Data 6. Endpoint Scheduled Tests 7. Endpoint Scheduled Test Data 8. Endpoint Instant Tests 9. Snapshots 10. Agents & Monitors 11. Alerts & Notifications 12. Labels 13. Reports 14. Administrative Endpoints 15. Usage ⚠️ ***Make sure you update your Environment Variables with the latest Token and Device information!*** 🆒 ***Javascript Tests scripts included with this collection to auto-update Environment variables where it fits***

Security
Developer Tools
Business Operations
false

Cisco UCS IMC

Cisco Unified Computing System (UCS) Integrated Management Controller (IMC) API examples. Documentation: [https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/sw/api/3_0/b_Cisco_IMC_REST_API_guide_301/m_redfish_api_examples.html#id_14844__section_1D6B7F9919B344F3B344CC4BF59C4CFB](https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/sw/api/3_0/b_Cisco_IMC_REST_API_guide_301/m_redfish_api_examples.html#id_14844__section_1D6B7F9919B344F3B344CC4BF59C4CFB)

Security
Developer Tools
Business Operations
false

Cisco ThousandEyes-API

This Open API specification serves as a standardized framework for describing and defining the capabilities of the Cisco ThousandEyes-API. It outlines how clients can interact with the API, providing a structured approach to document endpoints, operations, and other integration details. This specification is intended to promote clarity, consistency, and ease of use for developers and consumers of the API, ensuring efficient communication between systems.

Security
Developer Tools
Business Operations
false

Cisco ThreatGrid

https://panacea.threatgrid.com/mask/doc/mask/api-getting-started

Security
Developer Tools
Business Operations
false

Cisco Stealthwatch

Stealthwatch consists of two different products: Enterprise and Cloud. Check the subfolder descriptions for the appropriate documentation links.

Security
Developer Tools
Business Operations
false

Cisco Smart Licensing

API docs: [https://apidocs-prod.cisco.com](https://apidocs-prod.cisco.com) Main licensing page: [https://software.cisco.com](https://software.cisco.com/software/csws/ws/platform/home?locale=en_US#)

Security
Developer Tools
Business Operations
false

Cisco SMA

Contains Email Security Appliances (ESA) and Web Security Appliance (WSA) examples using the Security Management Appliance (SMA) API. dCloud lab: https://dcloud2-rtp.cisco.com/content/demo/581871?returnPathTitleKey=content-view API documentation: https://www.cisco.com/c/en/us/td/docs/security/security_management/sma/sma13-0/api_reference_guide/asyncos_api_ref.html

Security
Developer Tools
Business Operations
false

Cisco NSO

This only covers a sub-set of the RESTCONF Northbound API, since auto-generated swagger from the application is 200,000 lines of documentation. Created using https://github.com/NSO-developer/nso-vagrant as a localhost NSO testing environment.

Business Operations
false

Cisco Secure Firewall-Threat-Defense

The main goal of this collection to help the developer understand the various API capabilities of Cisco Next Gen Firewall using Firepower Device Manager APIs (This is local manager available on device)

Security
Developer Tools
Business Operations
false

Cisco Secure-APIs

The main goal of this collection to help the developer understand the various API capabilities of Cisco NGFW, Advanced Malware Protection, Threat Grid, , ISE and Umbrella. It will cover useful API features for each of the products and how to properly use them. Simple workflow is also included in the collection to *Collect* all the characteristics/signatures behind the possible attack using AMP. *Validate* the collected intelligence with Threat Grid and Umbrella. *Deploy* the intelligence to the NGFW, Umbrella and ISE to protect and contain the threat.

Security
Developer Tools
Business Operations
false

Cisco Secure APIs

The main goal of this collection to help the developer understand the various API capabilities of Cisco NGFW, Advanced Malware Protection, Threat Grid, , ISE and Umbrella. It will cover useful API features for each of the products and how to properly use them. Simple workflow is also included in the collection to *Collect* all the characteristics/signatures behind the possible attack using AMP. *Validate* the collected intelligence with Threat Grid and Umbrella. *Deploy* the intelligence to the NGFW, Umbrella and ISE to protect and contain the threat.

Security
Developer Tools
Business Operations
false

Cisco Secure Firewall-Management-Center

# Cisco Secure Firewall Management Center (FMC) The goal of this collection is to provide an easy-to-use collection of api calls to create, read, update and delete resources via FMCs REST API ## Structure The structure of this collection is based on FMCs API Explorer. ## Usage Various requests have dependencies on pre-existing resources hence "Pre-request Scripts" are being used to determine if Postman is already aware of the required UUIDs. If you encounter an error during execution telling you that a required resource cannot be found you can navigate to the resource folder and find a "Find $ResourceName ID" request. By executing this request Postman will search all existing resources (limited to a page size of 1000) for the name of the resource specified in the collection variables. If a resource with a matching name is found the UUID variable is automatically populated. ## Getting Started Within the postman collection navigate to "Variables" and edit the required variables hostname, username and password. After setting the required variables you will need to retrieve an authorization token. Within the "Authentication" folder you find two calls: * Retrieve Authorization Token (used for initial authentication) * Refresh Authorization Token (tokens are valid for 30 minutes and can be refreshed up to 3 times) ## Troubleshooting Most requests include console logging. Open up the Console to get additional information about a requests result

Security
Developer Tools
Business Operations
false

Cisco Secure Firewall Management Center (FMC)

# Cisco Secure Firewall Management Center (FMC) The goal of this collection is to provide an easy-to-use collection of api calls to create, read, update and delete resources via FMCs REST API ## Structure The structure of this collection is based on FMCs API Explorer. ## Usage Various requests have dependencies on pre-existing resources hence "Pre-request Scripts" are being used to determine if Postman is already aware of the required UUIDs. If you encounter an error during execution telling you that a required resource cannot be found you can navigate to the resource folder and find a "Find $ResourceName ID" request. By executing this request Postman will search all existing resources (limited to a page size of 1000) for the name of the resource specified in the collection variables. If a resource with a matching name is found the UUID variable is automatically populated. ## Getting Started Within the postman collection navigate to "Variables" and edit the required variables hostname, username and password. After setting the required variables you will need to retrieve an authorization token. Within the "Authentication" folder you find two calls: * Retrieve Authorization Token (used for initial authentication) * Refresh Authorization Token (tokens are valid for 30 minutes and can be refreshed up to 3 times) ## Troubleshooting Most requests include console logging. Open up the Console to get additional information about a requests result

Security
Developer Tools
Business Operations
false

Cisco PSIRT openVuln

[https://developer.cisco.com/docs/psirt/#!introduction](https://developer.cisco.com/docs/psirt/#!introduction)

Security
Developer Tools
Business Operations
false

Cisco NSO

https://developer.cisco.com/docs/nso/#!cisco-nso-swagger-api-docs

Security
Developer Tools
Business Operations
false

Cisco NDO (MSO)

Cisco Nexus Dashboard Orchestrator (NDO), formerly known as Multi Site Orchestrator (MSO). API reference: [https://developer.cisco.com/docs/nexus-dashboard-orchestrator/latest/#!api-reference](https://developer.cisco.com/docs/nexus-dashboard-orchestrator/latest/#!api-reference)

Security
Developer Tools
Business Operations
false

Cisco NDFC (DCNM)

Collection for Cisco Nexus Dashboard Fabric Controller (NDFC), formerly known as Data Center Network Manager (DCNM).

Security
Developer Tools
Business Operations
false

Cisco ISE_ERS_API

# Cisco ISE 3.0 ERS REST APIs ## License [Cisco Sample Code License](https://developer.cisco.com/site/license/cisco-sample-code-license/) ## Status These are the status icons for the requests so far. - ⌗ : must create resources to test - 🚧 : incomplete | untested - 🛑 : unsupported | bug ## Environment Variables This collection uses environment variables in scripts in the **Tests** tab to store data (`id`, `name`, `portalId`, etc.) between requests. This allows you to `GET` or `POST` then immediately `GET {id}` on a resource. Using **No Environment** will cause this convenience functionality to fail so be sure to choose one. ## Collection Variables This collection includes some default variables that you will want to update or override with environment variables for your ISE deployment. Specifically, you will want to set: - `ise_pan`: the ISE PAN node name or IP address. Default: `ise.securitydemo.net` - `rest_username`: the username for ERS API access. Must be a member of **SuperAdmin**, **ERSAdmin** or **ERSOperator** groups. Default: `admin` which is the ISE SuperAdmin - `rest_password`: Default: `C1sco12345` If you want to manipulate the `guestuser` resource(s) you will also need to use a separate sponsor account specified with: - `guestuser_username`: Default: `guestapi` - `guestuser_password`: Default: `C1sco12345`

Security
Developer Tools
Business Operations
false

Cisco Meraki

https://developer.cisco.com/meraki/api/#/rest

Security
Developer Tools
Business Operations
false

Cisco Kenna-Security-API

Use steps: Update authorization tab with your API code and then proceed to the API requests you require which are grouped by function (assets, vulnerabilities, etc) ************************************************************************************************************* This is a list of API calls that can be leveraged to get the most out of the Kenna Platform. The most current documentation can be found at: https://apidocs.kennasecurity.com/reference#reference-getting-started Getting Started This page will help you get started with Kenna Platform API. No connector available yet for one of your security tools? No problem. You can push vulnerabilities from any external system into Kenna using our simple, secure API. Enterprise integration has never been easier. The API is organized around REST to have predictable, resource-oriented URLs and to use HTTP response codes to indicate errors. We use HTTP verbs, which can be understood by off-the-shelf HTTP clients and libraries. The API utilizes JSON as the data exchange format. All API calls must be made over HTTPS and be accompanied by a valid token parameter. Your Kenna API root path depends on your Kenna URL. In most cases the API root path will be https://{{API_URL}}, assuming your Kenna instance url is https://mycompany.kennasecurity.com/. If you have an instance in the EU or in a private environment, your Kenna instance URL will include additional subdomain components, such as https://mycompany.eu.kennasecurity.com. In that case, only the instance specific hostname component (mycompany in the example) is replaced with api, so an instance with an EU address will use the EU api address of https://api.eu.kennasecurity.com/. SUGGEST EDITS Authentication Access to the API is controlled using a token. Every account has a token generated when the account is created. You may locate and change your API token by logging in and clicking your company's name in the upper right hand corner. In the dropdown that appears, chose 'API Keys'. Your API token will be listed first in the table found on the applications page. You would replace in the example below with your API token. All API requests must be made over HTTPS. Calls made over plain HTTP will fail. You must authenticate for all requests. Requests are limited to a maximum of 5 requests per second. If you exceed this limit, your request will receive a “429: Too Many Requests" status code response. SUGGEST EDITS Parameters Many API methods take optional parameters. For GET requests, parameters are specified as a segment in the path. For example if you were requesting data regarding a vulnerability with an id of 100: Request Response curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/vulnerabilities/100" -X GET For most POST requests, parameters are encoded as JSON, with a Content-Type of 'application/json': Request Response curl -H "X-Risk-Token: <token>" -H "Content-Type: application/json" https://{{API_URL}}/vulnerabilities -X POST -d '{ "vulnerability": { "wasc_id" : "WASC-01", "primary_locator" : "url", "url" : "http://www.example.com" } }' Note: The Content-Type parameter should be omitted for specific POST request endpoints, such as the "Upload Data File" endpoint. Larger record sets are paginated by 500. For example, when requesting your list of vulnerabilities. To page through the record set, you pass a page parameter. Each paginated response includes meta data containing the current page and the total number of pages. Page limit is currently set to 20. Pages are 1-indexed based. Request Response curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/vulnerabilities/?page=3" -X GET SUGGEST EDITS Data Types The API utilizes JSON as the data exchange format. Request Response curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/vulnerabilities/100" -X GET SUGGEST EDITS Errors In the case of an error, the appropriate HTTP status code will be returned in the response header. In addition, the response body will contain a JSON formatted description of what went wrong. The JSON will contain an error attribute, and may contain a more explanatory message attribute as well. It also includes a success attribute with a value of false. Request Response curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/assets/100" -X PUT -d {"priority":"-1"} SUGGEST EDITS HTTP Status Codes The following HTTP status codes are returned by the API. Code Meaning 102 Processing 200 OK 201 Created 204 No Content 400 Bad Request 401 Unauthorized 404 Not Found 409 Conflict 412 Precondition Failed 422 Unprocessable Entity 429 Too Many Requests (more than 5 per second) 500 Internal Server Error SUGGEST EDITS Pagination Requests that return multiple items will be paginated to 1000 items at a time, by default. You can request further pages with the page parameter, and/or change the number of items returned with the per_page parameter. Note that page numbering is 1-based and that omitting the page parameter will return the first page.

Security
Developer Tools
Business Operations
false

Cisco Kenna Security API

Use steps: Update authorization tab with your API code and then proceed to the API requests you require which are grouped by function (assets, vulnerabilities, etc) ************************************************************************************************************* This is a list of API calls that can be leveraged to get the most out of the Kenna Platform. The most current documentation can be found at: https://apidocs.kennasecurity.com/reference#reference-getting-started Getting Started This page will help you get started with Kenna Platform API. No connector available yet for one of your security tools? No problem. You can push vulnerabilities from any external system into Kenna using our simple, secure API. Enterprise integration has never been easier. The API is organized around REST to have predictable, resource-oriented URLs and to use HTTP response codes to indicate errors. We use HTTP verbs, which can be understood by off-the-shelf HTTP clients and libraries. The API utilizes JSON as the data exchange format. All API calls must be made over HTTPS and be accompanied by a valid token parameter. Your Kenna API root path depends on your Kenna URL. In most cases the API root path will be https://{{API_URL}}, assuming your Kenna instance url is https://mycompany.kennasecurity.com/. If you have an instance in the EU or in a private environment, your Kenna instance URL will include additional subdomain components, such as https://mycompany.eu.kennasecurity.com. In that case, only the instance specific hostname component (mycompany in the example) is replaced with api, so an instance with an EU address will use the EU api address of https://api.eu.kennasecurity.com/. SUGGEST EDITS Authentication Access to the API is controlled using a token. Every account has a token generated when the account is created. You may locate and change your API token by logging in and clicking your company's name in the upper right hand corner. In the dropdown that appears, chose 'API Keys'. Your API token will be listed first in the table found on the applications page. You would replace in the example below with your API token. All API requests must be made over HTTPS. Calls made over plain HTTP will fail. You must authenticate for all requests. Requests are limited to a maximum of 5 requests per second. If you exceed this limit, your request will receive a “429: Too Many Requests" status code response. SUGGEST EDITS Parameters Many API methods take optional parameters. For GET requests, parameters are specified as a segment in the path. For example if you were requesting data regarding a vulnerability with an id of 100: Request Response curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/vulnerabilities/100" -X GET For most POST requests, parameters are encoded as JSON, with a Content-Type of 'application/json': Request Response curl -H "X-Risk-Token: <token>" -H "Content-Type: application/json" https://{{API_URL}}/vulnerabilities -X POST -d '{ "vulnerability": { "wasc_id" : "WASC-01", "primary_locator" : "url", "url" : "http://www.example.com" } }' Note: The Content-Type parameter should be omitted for specific POST request endpoints, such as the "Upload Data File" endpoint. Larger record sets are paginated by 500. For example, when requesting your list of vulnerabilities. To page through the record set, you pass a page parameter. Each paginated response includes meta data containing the current page and the total number of pages. Page limit is currently set to 20. Pages are 1-indexed based. Request Response curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/vulnerabilities/?page=3" -X GET SUGGEST EDITS Data Types The API utilizes JSON as the data exchange format. Request Response curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/vulnerabilities/100" -X GET SUGGEST EDITS Errors In the case of an error, the appropriate HTTP status code will be returned in the response header. In addition, the response body will contain a JSON formatted description of what went wrong. The JSON will contain an error attribute, and may contain a more explanatory message attribute as well. It also includes a success attribute with a value of false. Request Response curl -H "X-Risk-Token: <token>" "https://{{API_URL}}/assets/100" -X PUT -d {"priority":"-1"} SUGGEST EDITS HTTP Status Codes The following HTTP status codes are returned by the API. Code Meaning 102 Processing 200 OK 201 Created 204 No Content 400 Bad Request 401 Unauthorized 404 Not Found 409 Conflict 412 Precondition Failed 422 Unprocessable Entity 429 Too Many Requests (more than 5 per second) 500 Internal Server Error SUGGEST EDITS Pagination Requests that return multiple items will be paginated to 1000 items at a time, by default. You can request further pages with the page parameter, and/or change the number of items returned with the per_page parameter. Note that page numbering is 1-based and that omitting the page parameter will return the first page.

Security
Developer Tools
Business Operations
false

Cisco FTD

https://developer.cisco.com/site/ftd-api-reference

Security
Developer Tools
Business Operations
false

Cisco ISE_pxGrid_API

# Cisco ISE 3.0 pxGrid REST APIs ## License [Cisco Sample Code License](https://developer.cisco.com/site/license/cisco-sample-code-license/) ## Status These are the status icons for the requests so far. - ⌗ : must create resources to test - 🚧 : incomplete | untested - 🛑 : unsupported | bug ## Environment Variables This collection uses environment variables in scripts in the **Tests** tab to store data (`id`, `name`, `portalId`, etc.) between requests. This allows you to `GET` or `POST` then immediately `GET {id}` on a resource. Using **No Environment** will cause this convenience functionality to fail so be sure to choose one. ## Collection Variables This collection includes some default variables that you will want to update or override with environment variables for your ISE deployment. Specifically, you will want to set: - `ise_pxg`: the ISE PAN node name or IP address. Default: `ise.securitydemo.net` - `rest_username`: the username for ERS API access. Must be a member of **SuperAdmin**, **ERSAdmin** or **ERSOperator** groups. Default: `admin` which is the ISE SuperAdmin - `rest_password`: Default: `C1sco12345`

Security
Developer Tools
Business Operations
false

Cisco CE xAPI (as Integrator)

xAPI is the Application Programming Interface (API) for Collaboration Endpoint software(Cisco CE and RoomOS), for both on-premise registered video conferencing devices (CUCM, VCS) as well as devices registered to Cisco’s cloud service (Cisco Webex Devices). **This collection gathers commands accessible to an 'Integrator' user, and local to the collaboration device.** Which commands are available depends on the product, the back-end (on-premise, cloud), and the user role of the local user (admin, audit, integrator, roomcontrol, user). To get an overview of the commands, check the reference guide for the version of CE or RoomOS you are running. Here is a link to the guide for CE 9.8 and RoomOS as of September 2019: https://www.cisco.com/c/dam/en/us/td/docs/telepresence/endpoint/ce98/collaboration-endpoint-software-api-reference-guide-ce98.pdf This collection comes with default environment variables: - endpoint: replace with the LAN ip adress of your collection device, defaults to: http://192.168.1.32 - credentials: replace with your integrator credentials, or one of the proposed below, defaults to: 'creds-integrator' - creds-integrator: defaults to 'aW50ZWdyYXRvcjppbnRlZ3JhdG9y', which corresponds to a base64 encoding of 'integrator:integrator' - the default credentials for the 'Integrator' role on [DevNet Sandbox RoomKit devices](https://github.com/CiscoDevNet/awesome-xapi#developer-tools) - creds-admin: defaults to 'cmVtb3Rlc3VwcG9ydDo2US82a0JDYnJ0DQo=', which corresponds to a base64 encoding of 'admin:ciscopsdt' - the default credentials for the "Admin" role on [DevNet Sandbox RoomKit devices](https://github.com/CiscoDevNet/awesome-xapi#developer-tools) - creds-localadmin: defaults to 'bG9jYWxhZG1pbjpjaXNjb3BzZHQ', which corresponds to a base64 encoding of "localadmin:ciscopsdt" - the default credentials for DevNet learning labs when addind an "Admin" role for cloud-registered Webex Devices running RoomOS.

Security
Developer Tools
Business Operations
false

Cisco ISE_MNT_API

# Cisco ISE 3.0 MNT REST APIs ## License [Cisco Sample Code License](https://developer.cisco.com/site/license/cisco-sample-code-license/) ## Status These are the status icons for the requests so far. - ⌗ : must create resources to test - 🚧 : incomplete | untested - 🛑 : unsupported | bug ## Environment Variables This collection uses environment variables in scripts in the **Tests** tab to store data (`id`, `name`, `portalId`, etc.) between requests. This allows you to `GET` or `POST` then immediately `GET {id}` on a resource. Using **No Environment** will cause this convenience functionality to fail so be sure to choose one. ## Collection Variables This collection includes some default variables that you will want to update or override with environment variables for your ISE deployment. Specfically, you will want to set: - `ise_mnt`: the ISE PAN node name or IP address. Default: `ise.securitydemo.net` - `rest_username`: the username for ERS API access. Must be a member of **SuperAdmin**, **ERSAdmin** or **ERSOperator** groups. Default: `admin` which is the ISE SuperAdmin - `rest_password`: Default: `C1sco12345`

Security
Developer Tools
Business Operations
false

Cisco ISE

ISE supports two different APIs: ERS and pxGrid. Check the subfolder descriptions for the appropriate documentation links. Recommended setup for DevNet sandbox ISE instances: 1. Administration > pxGrid Services > Settings - enable "Allow password based account creation" 2. Administration > System > Settings > Protocols > Radius - disable "Suppress Repeated Failed Clients" - disable "Suppress repeated successful authentications" 3. If sending RADIUS messages from your DevBox, add it as a NAD, or enable the default device.

Security
Developer Tools
Business Operations
false

Cisco Intersight

## Cisco Intersight Postman Collection The Cisco Intersight Postman Collection provides a subset of all Intersight calls. Cisco Intersight is based on the OpenAPI specification and as such a Postman collection can be created directly from the OpenAPI specification. However the OpenAPI specification does not provide the pre-requestion operation of siging the request. A request signed with the user's API Key ID and their Secret Key is needed to authenticate the request. Additionally, the pre-request script pre-processes the Body and URL Postman variable prior to signing the request. The pre-request script requires two variables, that must be in the current Postman environment and named exactly as follows; **api-key** - which is available in the Intersight Web interafce after a successful API Key creation. **secret-key** - which is the complete text of the SecretKet.txt file that is downloaded after a successful API Key creation. With defined API Key environment variables the provided calls will work within the limits of your Intersight account. With respect to licensing and account capabilities. The collection also contains some basic test that determine the success or failure of the request and is the request completed in a certain amount of time. Several of the requests contain post-request tests to perform various activities - Update the Postman console - Set Environment variables - Unset Environment variables Cisco DevNet provides several Learning Labs and an Inersight Sandbox to get you started using these Postman Calls. ## Cisco DevNet resources - [Cisco Intersight DevNet Learning Labs ](https://developer.cisco.com/learning/modules/intersight-rest-api) - [Cisco Intersight DevNet Sandbox](https://devnetsandbox.cisco.com/RM/Diagram/Index/a63216d2-e891-4856-9f27-309ca61ec862?diagramType=Topology)

Security
Developer Tools
Business Operations
false

Cisco FMC

https://<management_center_IP_or_name>:<https_port>/api/api-explorer

Security
Developer Tools
Business Operations
false

Cisco DNAC and SDA

https://developer.cisco.com/docs/dna-center/api/1-3-3-x/

Security
Developer Tools
Business Operations
false

Cisco Cyber Vision Center v3 API

Postman collection of Cisco's industrial security software Cyber Vision. APIv3 0.1

Security
Developer Tools
Business Operations
false

Cisco CUCM

This Open API specification serves as a standardized framework for describing and defining the capabilities of the Cisco CUCM. It outlines how clients can interact with the API, providing a structured approach to document endpoints, operations, and other integration details. This specification is intended to promote clarity, consistency, and ease of use for developers and consumers of the API, ensuring efficient communication between systems.

Security
Developer Tools
Business Operations
false

Cisco Cloudlock Enterprise API

The Cloudlock Enterprise API provides data about applications, activities, incidents, policies, and IP addresses in your organization.

Security
Developer Tools
Business Operations
false

Chefzone

This Open API specification serves as a standardized framework for describing and defining the capabilities of the Chefzone. It outlines how clients can interact with the API, providing a structured approach to document endpoints, operations, and other integration details. This specification is intended to promote clarity, consistency, and ease of use for developers and consumers of the API, ensuring efficient communication between systems.

Hospitality
false

Cisco CE xAPI (as admin)

xAPI is the Application Programming Interface (API) for Collaboration Endpoint software(Cisco CE and RoomOS), for both on-premise registered video conferencing devices (CUCM, VCS) as well as devices registered to Cisco’s cloud service (Cisco Webex Devices). **This collection gathers commands accessible to an 'Admin' user, and local to the collaboration device.** Which commands are available depends on the product, the back-end (on-premise, cloud), and the user role of the local user (admin, audit, integrator, roomcontrol, user). To get an overview of the commands, check the reference guide for the version of CE or RoomOS you are running. Here is a link to the guide for CE 9.8 and RoomOS as of September 2019: https://www.cisco.com/c/dam/en/us/td/docs/telepresence/endpoint/ce98/collaboration-endpoint-software-api-reference-guide-ce98.pdf This collection comes with default environment variables: - endpoint: replace with the LAN ip adress of your collection device, defaults to: http://192.168.1.32 - credentials: replace with your integrator credentials, or one of the proposed below, defaults to: 'creds-admin' - creds-integrator: defaults to 'aW50ZWdyYXRvcjppbnRlZ3JhdG9y', which corresponds to a base64 encoding of 'integrator:integrator' - the default credentials for the 'Integrator' role on [DevNet Sandbox RoomKit devices](https://github.com/CiscoDevNet/awesome-xapi#developer-tools) - creds-admin: defaults to 'cmVtb3Rlc3VwcG9ydDo2US82a0JDYnJ0DQo=', which corresponds to a base64 encoding of 'admin:ciscopsdt' - the default credentials for the "Admin" role on [DevNet Sandbox RoomKit devices](https://github.com/CiscoDevNet/awesome-xapi#developer-tools) - creds-localadmin: defaults to 'bG9jYWxhZG1pbjpjaXNjb3BzZHQ', which corresponds to a base64 encoding of "localadmin:ciscopsdt" - the default credentials for DevNet learning labs when addind an "Admin" role for cloud-registered Webex Devices running RoomOS.

Security
Developer Tools
Business Operations
false

Cisco AppDynamics

https://docs.appdynamics.com/display/PRO45/AppDynamics+APIs This collection was built based off the sample Java app in this DevNet learning lab: https://developer.cisco.com/learning/modules/appdynamics-fundamentals/fnd-01-appd-apm-java/step/1

Security
Developer Tools
Business Operations
false

Cisco BGP EVPN RESTCONF

# Cisco EVPN BGP Postman Collection Brought to you by * Robert Csapo ([https://github.com/robertcsapo](https://github.com/robertcsapo)) This collection uses RESTCONF * [Enabling RESTCONF on IOS-XE](https://developer.cisco.com/docs/ios-xe/#!enabling-restconf-on-ios-xe) **Note:** Make sure you **update** your *Environment Variables* with your Cisco Device IOS-XE variables * host * username * password Learn more about Cisco BGP EVPN here * [IOS-XE](https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/17-8/configuration_guide/vxlan/b_178_bgp_evpn_vxlan_9300_cg.html) Found an issue? - let us know.

Security
Developer Tools
Business Operations
false

Cisco AMP

https://api-docs.amp.cisco.com/api_resources?api_host=api.amp.cisco.com&api_version=v1

Security
Developer Tools
Business Operations
false

CircleCI REST API v1

The CircleCI API is a RESTful, fully-featured API that allows you to do almost anything in CircleCI. You can access all information and trigger all actions. The only thing we don’t provide access to is billing functions, which must be done from the CircleCI web UI.

Integration
Developer Tools
false

CircleCI - Reference

This describes the resources that make up the CircleCI API v2. # Authentication <!-- ReDoc-Inject: <security-definitions> -->

Integration
Developer Tools
false

CircleCI - Capability

The requests in this collection use the Postman API, if you don't already have an API key, you can generate it by following the instructions [here](https://learning.postman.com/docs/developer/intro-api/#generating-a-postman-api-key).

Integration
Developer Tools
false

CircleCI

This describes the resources that make up the CircleCI API v2. Contact Support: Name: No Contact Email: email@example.com

Integration
Developer Tools
false

Cintell API

![cintell](https://app.cintell.net/images/logo_cintell@2x.png "cintell") # Cintell API Documentation ## Introduction This documentation will describe how to use cintell API in details ### API Lists 1. Get Counts API v1.0 1. Get Contacts by Email API v1.0 1. Get Contacts by Email from CSV API v1.0

Developer Tools
false

CIMS

With api versions (not deployed)

Business Operations
false

Chaingateway io

This is a generated connector for [Chaingateway API v1.0](https://chaingateway.io/docs-ethereum) OpenAPI specification. This is the REST API to build the bridge between Ethereum and the real world. All of the integrations communicates with chaingateway.io through this API.

Crypto
false

CEL.ro Marketplace

CEL.ro Marketplace

Ecommerce
false

Centuary

This Open API specification serves as a standardized framework for describing and defining the capabilities of the Centuary. It outlines how clients can interact with the API, providing a structured approach to document endpoints, operations, and other integration details. This specification is intended to promote clarity, consistency, and ease of use for developers and consumers of the API, ensuring efficient communication between systems.

Ecommerce
false

Censhare

This interface provides offered universe product data for bonds, equities and funds to Censhare.

CMS
false

Cencosud

Endpoints principales. Para el testing se usó los siguientes ids: | key | value | | --- | --- | | store_id | China wok: <br>o7w0AIoB3KREBYVRqNmn <br> <br>Wendy's: <br>orwzAIoB3KREBYVRotmL <br> <br>KFC: <br>3rzO24kB3KREBYVRDmk5 | | order_id | ZyESlYoBrxNoS5ayikyf | | payment_id | 162293d3-53a6-42af-a11f-09f799160aad | Algunos valores, como los valores que se envía para cambiar el estado de la orden, se encuentran dentro de la doc del API: <img src="https://content.pstmn.io/9cd898bf-c905-48ad-9179-e007936cd6e9/Q2FwdHVyYSBkZSBwYW50YWxsYSAyMDI0LTAxLTIzIGEgbGEocykgMDkuMjcuMTUucG5n" width="2838" height="524">

Ecommerce
false

CCS-UK

![BT logo](https://absdev.abs5.co.uk/i/abs_apex_files/images/BT_Logo.png) Use the Advanced Information System API to send truck movements to AIS and request status updates for those trucks as they progress from the point of departure through to arrival. Additional functionality is available to send customs messages to the relevant authorities for :- - Movements in Temporary Storage (MiTS)) - Goods Vehicle Movement Service (GVMS) - Import Control System (ICS Europe) - Safety and Security Import Declarations (S&S GB)

Logistics
false

CCAM

The CCAM Statistics API provides comprehensive insights into real-time and historical traffic data, facilitating informed decision-making and enhancing traffic management strategies within the Cooperative, Connected, and Automated Mobility (CCAM) framework. Leveraging this API, developers can access a wealth of information related to vehicle movements, flow dynamics, and congestion patterns.

Business Operations
false
Start building today

Ready to start integrating?

Google Ads
Batch
Dropbox
Airtable
Asana
Calendly
Filter