{"id":79432,"date":"2023-06-05T13:12:11","date_gmt":"2023-06-05T17:12:11","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=79432"},"modified":"2024-07-22T17:13:41","modified_gmt":"2024-07-22T21:13:41","slug":"directory-insights-api","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/directory-insights-api","title":{"rendered":"Directory Insights API"},"content":{"rendered":"\n
Directory Insights allows you to read event logs, view activity in your directory, and monitor user authentications to the User Portal, RADIUS, LDAP, and SSO apps. Directory Insights analyzes the audit trails that lead to critical events so you know all about your directory activities, including the what, where, when, how, and who. You can monitor:<\/p>\n\n\n\n
Directory Insights is available in 探花大神’s API<\/a>, Powershell, and Activity Log. The API uses a single POST endpoint: For more information on the Directory Insights API, see the complete Directory Insights API documentation<\/a>.<\/p>\n\n\n\n This API key is associated with the administrator currently logged in. Only administrator roles can access the API. Command runners receive a 403 error.<\/p>\n\n\n\n
https:\/\/api.jumpcloud.com\/insights\/directory\/v1\/events.<\/p>\n\n\n\nAPI Key Considerations<\/h2>\n\n\n\n