Gets the metadata of the specified set of credentials for synthetic monitors. The credentials set itself (username/certificate and password) is not included in the response.
The request produces an application/json
payload.
GET | SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/credentials/{id} |
Environment ActiveGateCluster ActiveGate | https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/credentials/{id} |
To execute this request, you need an access token with credentialVault.read
scope.
To learn how to obtain and use it, see Tokens and authentication.
The Dynatrace entity ID of the required credentials set.
CredentialsResponseElement
objectMetadata of the credentials set.
Allow access without app context, for example, from ad hoc functions in Workflows (requires the APP_ENGINE scope).
The list contains summary data related to the use of credentials.
A short description of the credentials set.
Configuration for external vault synchronization for username and password credentials.
The ID of the credentials set.
The name of the credentials set.
The owner of the credential (user for which used API token was created).
Flag indicating that this credential is visible only to the owner.
The scope of the credentials set.
APP_ENGINE
EXTENSION
SYNTHETIC
The set of scopes of the credentials set.
APP_ENGINE
EXTENSION
SYNTHETIC
The type of the credentials set.
AWS_MONITORING_KEY_BASED
AWS_MONITORING_ROLE_BASED
CERTIFICATE
PUBLIC_CERTIFICATE
SNMPV3
TOKEN
UNKNOWN
USERNAME_PASSWORD
CredentialAccessData
objectThe set of entities allowed to use the credential.
APPLICATION
UNKNOWN
USER
CredentialUsageHandler
objectKeeps information about credential's usage.
The number of uses.
Type of usage.
ExternalVaultConfig
objectConfiguration for external vault synchronization for username and password credentials.
Defines the actual set of fields depending on the value. See one of the following objects:
HASHICORP_VAULT_APPROLE
-> HashicorpApproleConfigHASHICORP_VAULT_CERTIFICATE
-> HashicorpCertificateConfigAZURE_KEY_VAULT_CLIENT_SECRET
-> AzureClientSecretConfigCYBERARK_VAULT_USERNAME_PASSWORD
-> CyberArkUsernamePasswordConfigCYBERARK_VAULT_ALLOWED_LOCATION
-> CyberArkAllowedLocationConfigAZURE_KEY_VAULT_CLIENT_SECRET
CYBERARK_VAULT_ALLOWED_LOCATION
CYBERARK_VAULT_USERNAME_PASSWORD
HASHICORP_VAULT_APPROLE
HASHICORP_VAULT_CERTIFICATE
AZURE_CERTIFICATE_MODEL
AZURE_CLIENT_SECRET_MODEL
CYBERARK_VAULT_ALLOWED_LOCATION_MODEL
CYBERARK_VAULT_USERNAME_PASSWORD_MODEL
HASHICORP_APPROLE_MODEL
HASHICORP_CERTIFICATE_MODEL
{"allowContextlessRequests": "false","credentialUsageSummary": [{"BROWSER_MONITOR": 2,"HTTP_MONITOR": 3}],"description": "Sample credentials for demo purposes.","externalVault": {"passwordSecretName": "password","pathToCredentials": "kv/credentials","roleId": "00e4858c-ec33-bc99-4e7e-34de6967de6c","secretId": "CREDENTIALS_VAULT-XXXXXXXXXXXXXXXX","sourceAuthMethod": "HASHICORP_VAULT_APPROLE","usernameSecretName": "username","vaultNamespace": "admin","vaultUrl": "https://vault-cluster.vault.fb17d2fc-be92-4230-afa2-91dbfda3cbad.aws.hashicorp.cloud:8200"},"id": "CREDENTIALS_VAULT-C43F2C2E6395AD23","name": "Sample username-password credentials","owner": "user@domain.com","ownerAccessOnly": true,"scope": "SYNTHETIC","type": "USERNAME_PASSWORD"}