Citrix ADM NITRO API Reference

si_security_violation

Configuration for AF Threat Data Report table resource.

Properties

(click to see Operations )

Name Data Type Permissions Description
violation_action <String> Read-write violation_action.

Maximum length = 255
threat_index <Double> Read-write Threat Index.
not_blocked_flags <Double> Read-write Not Block Flags..
violation_value <String> Read-write Violation Value.

Maximum length = 255
name <String> Read-write AppName.

Maximum length = 255
violation_name <String> Read-write violation_name.

Maximum length = 255
violation_threat_index <Double> Read-write Violation Threat Index..
transformed_flags <Double> Read-write Transformed Flags..
si_app_unit_name <String> Read-write AppName.

Maximum length = 255
__count <Double> Read-write Number of records.
id <String> Read-write Id is Security check violation name.

Maximum length = 255
attack_category <String> Read-write attack_category.

Maximum length = 255
block_flags <Double> Read-write Block Flags..
severity <Double> Read-write severity..
total_attacks <Double> Read-write total attacks..

Operations

(click to see Properties )

  • GET (ALL)

Some options that you can use for each operations:

  • Getting warnings in response: NITRO allows you to get warnings in an operation by specifying the 'warning' query parameter as 'yes'. For example, to get warnings while connecting to the NetScaler appliance, the URL is as follows:

    http:// <netscaler-ip-address> /nitro/v1/config/login?warning=yes

    If any, the warnings are displayed in the response payload with the HTTP code '209 X-NITRO-WARNING'.

  • Authenticated access for individual NITRO operations: NITRO allows you to logon to the NetScaler appliance to perform individual operations. You can use this option instead of creating a NITRO session (using the login object) and then using that session to perform all operations,

    To do this, you must specify the username and password in the request header of the NITRO request as follows:

    X-NITRO-USER: <username>

    X-NITRO-PASS: <password>

    Note: In such cases, make sure that the request header DOES not include the following:

    Cookie:NITRO_AUTH_TOKEN= <tokenvalue>

*Note: * Mandatory parameters are marked in red and placeholder content is marked in green

The following parameters can be used in the nitro request : onerror <String_value>

Use this parameter to set the onerror status for nitro request. Applicable only for bulk requests.

Default value: EXIT

Possible values = EXIT, CONTINUE

get (all)

URL: https://<MGMT-IP>/nitro/v2/config/si_security_violation Query-parameters:

cr_enabled Use this query-parameter to indicate cr is enabled or not.

Possible Values: 0, 1 report_start_time Use this query-parameter to specify the start time from which the summary for report is considered.

Possible Values: time in milli seconds report_end_time Use this query-parameter to specify the end time until where summary for report is considered.

Possible Values: time in milli seconds asc Use this query-parameter to specify whether the results should be in ascending order or not.

Possible Values: yes, no sla_enabled Use this query-parameter to indicate sla is enabled or not.

Possible Values: 0, 1 order_by Use this query-parameter to get the result that is ordered by the given property.

Possible Values: total_attacks type Use this query-parameter to specify the type.

Possible Values: total_attacks HTTPS Method: GET

Response: HTTPS Status Code on Success: 200 OK HTTPS Status Code on Failure: 4xx (for general HTTPS errors) or 5xx (for NetScaler-MAS-specific errors). The response payload provides details of the error

Response Headers:

Content-Type:application/json

Response Payload:

{ "errorcode": 0, "message": "Done", "severity": ;ltString_value;gt, "si_security_violation":[{
"violation_action":<String_value>,
"threat_index":<Double_value>,
"not_blocked_flags":<Double_value>,
"violation_value":<String_value>,
"name":<String_value>,
"violation_name":<String_value>,
"violation_threat_index":<Double_value>,
"si_device_ip_address":<String_value>,
"transformed_flags":<Double_value>,
"si_app_unit_name":<String_value>,
"__count":<Double_value>,
"id":<String_value>,
"attack_category":<String_value>,
"block_flags":<Double_value>,
"severity":<Double_value>,
"total_attacks":<Double_value>}]}

<!--NeedCopy-->
si_security_violation