Creating API keys
Use GuardiumĀ® Data Security Center APIs (application programming interfaces) to interact with other applications, such as Guardium Data Protection, universal connectors, and Guardium Data Security Center reports.
Before you begin
You can generate API keys from the Guardium
Data Security Center API keys page. You can then use the keys to authenticate to the interactive API.
Attention: Guardium
Data Security Center includes several different subscription plans. Each subscription plan has different privileges and certain APIs are available only with certain subscription plans. Therefore, your Guardium
Data Security Center instance might not support some of the APIs that are available in the Insights SaaS API Reference).
If you run an API that your subscription does not support, Guardium Data Security Center returns an error message.
Note: Premium You can also create and use an OAuth authorization token, as described in Accessing Guardium Data Security Center APIs with OAuth.
From the Guardium Data Security Center API keys page, you can link to the API reference landing page, and then to the API reference, which lists the available APIs.
Procedure
Results
icon next to the key that you want to delete.
After you create the keys and token, you can use them to call the APIs.
).
icon next to the element to copy the information for that element (that is, the