logo
Log in
Hero image

Explore the capabilities of our API, designed to streamline integration and enhance functionality. This documentation provides comprehensive guidance on endpoints, authentication methods, and usage examples to help you leverage our services effectively.

Create an API token

Illustrative image
uap-schema-api

Access Control Policies API

Manage policies to enforce zero standing privileges (ZSP) across your cloud and infrastructure environments.
access-request-api

Access Requests API

VIew and manage access requests
identity-docs-api

Identity APIs

Secure and manage identities with SSO, adaptive MFA, and lifecycle management.
risk-management-api

Risk Management API

Mitigate risks based on the CyberArk Blueprint and detect and respond to threats in near real-time.
secretshub-api

Secrets Hub API

Manage secrets in your CyberArk PAM solution and consume them natively in your cloud platform.
secrets-manager-saas

Secrets Manager, SaaS APIs

Centralize secrets management across any cloud or DevOps environment for seamless cloud portability.
sca-api

Secure Cloud Access APIs

Secure access to cloud management and services with zero standing permissions