- Username & Password — user accounts provisioned and rotated by the integration (HR system, PMS, event system).
- Access Policy — add or remove email patterns that gate self-provisioning, Meeting Host, Conference, or Event Access modules.
- Whitelisting — allow-list devices by MAC address so they bypass the Captive Portal.
Authentication
Every request carries a per-Context API key in thex-auth-token
header. The key lives on the Context — enable and rotate it under
Administration → Configuration → Common Settings in the Sign-In
Context admin. The same section lists every endpoint the API exposes
and which legacy / V1 paths map to each other.
API key for the target Sign-In Context. Rotatable from the admin.
403 Forbidden regardless of the API key. Coordinate
whitelisting with the Organization admin before integration goes
live.
Base URL
Every endpoint is built the same way:Finding your {apiBaseUrl}
To find the value that applies to your Organization:
- Check the dashboard instructions on your Organization’s admin home page — they list the API base URL that’s been configured for your deployment.
- If the dashboard doesn’t show it, ask your Organization admin for the integration base URL.
{apiBaseUrl} or
$API_BASE_URL in examples.
Path parameters
Organization ID the Sign-In Context belongs to. Visible alongside
the base URL in the dashboard instructions.
Sign-In Context ID. Visible alongside the base URL in the
dashboard instructions.
Content type
All request and response bodies are JSON. Set:HTTP status codes
Common across every endpoint:| Status | Meaning |
|---|---|
200 | Success. |
204 | Success, no response body (DELETE). |
400 | Request body failed validation. Body shape is family-specific — see the per-family overview. |
401 | Missing or invalid x-auth-token. |
403 | Source IP is not whitelisted, or the Context / Organization cannot be resolved. |
API families
Username & Password
Create, update, and delete username/password users.
Access Policy
Add or remove email patterns that gate email-driven modules.
Whitelisting
Allow-list devices so they bypass the Captive Portal.

