- URL:
- https://<root>/security/roles/getRolesForUser
- Methods:
POST- Version Introduced:
- 10.1
Access requirements
Required privileges
The Sever Administrator API requires privilege-based access. An administrator must be assigned a specific user privilege, or role, to access any given endpoint. Listed below are the user privileges or roles an administrator can be assigned that provides access to this endpoint. If multiple privileges are listed, only one needs to be assigned to gain access.
Note that administrators assigned a custom role must also have the administrative View all content privilege assigned to them to access the API directory as an administrator. Additonally, any custom roles that include a webhook-related privilege must also include the general Publish server-based layers content privilege.
Tokens
This API requires token-based authentication. A token is automatically generated for administrators who sign in to the Server Administrator API directory's HTML interface. Tokens generated in this way are stored for the entirety of the session.
Those accessing the API directory outside of the HTML interface will need to acquire a session token from the generate operation in the Portal Directory API. For security reasons, all POST requests made to the Server Administrator API must include a token in the request body.
Description
The get operation returns a list of role names that have been assigned to a particular user account. This operation is used by the authorization module in ArcGIS Server to determine the collective privileges of a requesting user account.
Request parameters
| Parameter | Description |
|---|---|
| The name of the user for whom to return the roles. Example |
(Optional) | A filter to be applied to the resultant role set. |
| The maximum number of results to return for this query. Example |
| The response format. The default response format is Values: |
Example usage
The following is a sample POST request for the get operation that seeks to return all roles that have been assigned to user 'jwhite':
POST /<context>/admin/security/roles/getRolesForUser HTTP/1.1
Host: organization.example.com
Content-Type: application/x-www-form-urlencoded
Content-Length: []
username=jwhite&filter=&maxCount=20&f=pjsonJSON Response syntax
{
"roles": ["<role1>", "<role2>"],
"hasMore": <true|false>
}