Creating API keys
Use Guardium® Data Security Center APIs (application programming interfaces) to interact with other applications, such as Guardium Data Protection, universal connectors, and Guardium Data Security Center reports.
Before you begin
You can generate API keys from the Guardium
Data Security Center
API keys page. You can then use the keys to authenticate to the interactive
API.
Attention: Guardium
Data Security Center includes
several different subscription plans. Each subscription plan has different privileges and certain
APIs are available only with certain subscription plans. Therefore, your Guardium
Data Security Center instance might not support some of the APIs that
are available in the
Insights SaaS
API Reference).
If you run an API that your subscription does not support, Guardium Data Security Center returns an error message.
Note: Premium You can also create and use an OAuth
authorization token, as described in Accessing Guardium Data Security Center APIs with OAuth.
From the Guardium Data Security Center API keys page, you can link to the API reference landing page, and then to the API reference, which lists the available APIs.
Procedure
Results
icon next to the
key that you want to delete.After you create the keys and token, you can use them to call the APIs.
).
icon next to the element to copy the information for that element (that is, the