Users endpoint

The Users endpoint is read-only. You cannot create, update, or destroy a user via the REST API.

GET /pro/api/users

Retrieves all users, ordered by id.

Sample request:

$ curl \
   -H 'Authorization: Token token="xMsNwttqN5bVNEYcrIF01s65"' \
   https://dradis-pro.dev/pro/api/users

Result:

[
  {
    "id": 1,
    "name": "Admin",
    "email": "admin@securityroots.com",
    "created_at": "2018-12-12T15:03:00.000Z",
    "updated_at": "2018-12-14T20:39:16.000Z"
  },
  {
    "id": 3,
    "name": "Daniel",
    "email": "daniel@securityroots.com",
    "created_at": "2019-01-08T16:15:24.000Z",
    "updated_at": "2019-01-08T16:15:24.000Z"
  }
]

GET /pro/api/users/:id

Retrieves a single user.

Sample request:

$ curl \
  -H 'Authorization: Token token="xMsNwttqN5bVNEYcrIF01s65"' \
  https://dradis-pro.dev/pro/api/users/3

Result:

{
    "id": 3,
    "name": "Daniel",
    "email": "daniel@securityroots.com",
    "created_at": "2019-01-08T16:15:24.000Z",
    "updated_at": "2019-01-08T16:15:24.000Z"
}

Next help article: Projects endpoint →

Seven Strategies To Differentiate Your Cybersecurity Consultancy

You don’t need to reinvent the wheel to stand out from other cybersecurity consultancies. Often, it's about doing the simple things better, and clearly communicating what sets you apart.

  • Tell your story better
  • Improve your testimonials and case studies
  • Build strategic partnerships

Your email is kept private. We don't do the spam thing.