Using Postman to Manage Workspace ONE Identities

There are times during troubleshooting where you like to see a particular attribute in Workspace ONE Access and its not displayed in the web portal or times when you would like to update a particular attribute or delete a JIT user.

DISCLAIMER:  Please use the API with caution as this can potentially cause issues if not used appropriately. Please do NOT use in Production. Please use at your own risk.

In this blog we’ll walk through a few useful API calls to help in your troubleshooting. For a complete list of API calls and documentation:

VMware Identity Manager API – VMware API Explorer – VMware {code}

Please download and install the latest version of Postman.

Update: This blog has been updated with Postman v7.36.0 steps.

In this blog we’ll go use the following API’s:

  • Get Specific User Details
  • Update SCIM User
  • Delete SCIM User
  • Create SCIM User

Step 1: Getting your OAuth Token

In order do use the SCIM based API you need an OAuth token. I’m going to walk through two different ways of getting a token to use in your environment.

If you are going to access a particular environment quite often using postman I would suggest you go with Option 1. If its unlikely you will access a particular environment that often then you should go with Option 2.

Creating an OAuth Application

  1. Log into Workspace ONE Identity Admin Console
  2. Click on the Catalog (down arrow) and select Settings
  3. Click “Remote App Access”
  4. Click Create Client
  5. Select “Service Access Token” from the Drop down menu
  6. Provide a Client ID ie. PostmanClient
  7. Expand Advanced
  8. Click Generate Shared Secret (or provide one)
  9. Make note of the Access Token TTL. This will determine how long your bearer tokens are valid.
  10. Click Add
  1. We will configure Postman in the next section.

Step 2: Configure Postman to use your OAuth Token

Follow the instructions below to add your OAuth Token

  1. Open a new Tab in Postman
  2. In the authorization section, select “OAuth 2.0” as the type:
  1. On the right side, under “Configure New Token” – Provide a Token Name (ie. Workspace ONE – Preview)
  2. For Grant Type, Select “Client Credentials”
  1. Under “Access Token URL”, enter https://Tenant URL/SAAS/auth/oauthtoken
    ie. https://dsas.vmwareidentity.com/SAAS/auth/oauthtoken
  2. Under Client ID, enter your Client ID from step 1.
  3. Under Secret, enter your secret from step 1.
  4. Under Scope, enter “Admin”.
  5. Click “Get New Access Token”
  1. Click Proceed
  1. Click Use Token
  2. You can see all your tokens in the “Available Tokens” drop down menu in the current token section.

Getting User Details

Now that you have your OAuth token, we can use this token to query Workspace ONE Identity.

  1. For the HTTP Method, select “GET”
  2. Enter the following for the URL: https://TENANTURL/SAAS/jersey/manager/api/scim/Users?filter=username%20eq%20%22MyUserID%22
  3. Replace MyUserID with a username in your environment
    ie. https://dsas.vmwareidentity.com/SAAS/jersey/manager/api/scim/Users?filter=username%20eq%20%22sdsa%22
  4. This will return a complete result set of attributes for the particular user.

Updating User Details

In order to update user details via the API, you will need to collect some information from the Get User Details.

In my example, I’m going to update the “userPrincipalName” in Workspace ONE Access for one of my users.

  1. Perform a “Get” on the particular user and retrieve the schema information. Please note, this will be different for each tenant as the tenant name is part of the schema.
  1. Copy this section to notepad.
  2. Retrieve the section which contains the attribute(s) you want to update
  1. Copy the ID of the User
  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “PATCH”
  4. For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/scim/Users/{ID}
    Replace the Tenant URL with your URL
    Replace the ID with the ID from the step 4 in this section.
    ie. https://dsas.vmwareidentity.com/SAAS/jersey/manager/api/scim/Users/884b7e7d-6a7b-4985-b113-56235826e8a6
  5. Select Body
  6. Enter the JSON in raw text that we’ll post to Workspace ONE
  7. Select “JSON (application/json)” as the Content-Type
  1. Click Send
  2. You should receive a “204 No Content” response
  3. If you perform a GET User again you should see the value has changed.

Delete Users

If you are using JIT to onboard users into Workspace ONE Identity you’ve probably noticed there is no way to delete users in the web portal. They only way to delete is with the API.

  1. Perform a “Get” on the particular user and retrieve the ID
  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “DELETE”
  4. For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/scim/Users/%5BID%5D
    Replace the Tenant URL with your URL
    Replace the ID with the ID from the step 4 in this section.
    ie. https://dsas.vmwareidentity.com//SAAS/jersey/manager/api/scim/Users/f6f89782-0a2a-4cc8-84a8-057f1da6ecde
  5. Click Send
  1. You should receive a “204 No Content” response
  2. If you perform a GET User again you should see no results found.

Create Users

Creating Users in Workspace ONE Access require a lot more steps. I reluctantly decided to document the steps as this should really be done by the out of the box connectors. The process is slightly different between System Directory, Local Directory, and Other.  The “Other” directory is created automatically when setting up the UEM/WS1 Integration.

Creating Users in the System Directory

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “POST”
  4. For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/scim/Users
    Replace the Tenant URL with your URL
    Replace the ID with the ID from the step 4 in this section.
    ie. https://dsas.vmwareidentity.com//SAAS/jersey/manager/api/scim/Users
  5. Set the Content-Type to “application/json”
  6. Use the following as a sample:
{  
  "schemas": [  
    "urn:scim:schemas:core:1.0",  
    "urn:scim:schemas:extension:workspace:tenant:sva:1.0",  
    "urn:scim:schemas:extension:workspace:1.0",  
    "urn:scim:schemas:extension:enterprise:1.0"  
  ],  
  "userName": "testing4@mydomain.com",  
  "name": {  
    "givenName": "first4",  
    "familyName": "last4"  
  },  
  "emails": [  
    {  
      "value": "testing4@mydomain.com"  
    }  
  ],  
  "password": "Password$!"  
} 

Creating Users in a Local Directory

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “POST”
  4. For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/scim/Users
    Replace the Tenant URL with your URL
    Replace the ID with the ID from the step 4 in this section.
    ie. https://dsas.vmwareidentity.com//SAAS/jersey/manager/api/scim/Users
  5. Set the Content-Type to “application/json”
  6. Use the following as a sample:
{  
  "schemas": [  
    "urn:scim:schemas:core:1.0",  
    "urn:scim:schemas:extension:workspace:tenant:sva:1.0",  
    "urn:scim:schemas:extension:workspace:1.0",  
    "urn:scim:schemas:extension:enterprise:1.0"  
  ],  
  "userName": "testing5@mydomain.com",  
  "name": {  
    "givenName": "first5",  
    "familyName": "last5"  
  },  
  "emails": [  
    {  
      "value": "testing5@mydomain.com"  
    }  
  ],  
  "password": "Password$!",  
   "urn:scim:schemas:extension:workspace:1.0": {  
        "internalUserType": "LOCAL",  
        "domain": "mydomain.com"  
      }  
  
  
}    

Creating Users in an Other Directory

The steps to create a user in an other directory is almost identical to the local directory except that we need to know the “domain” associated with the directory and we need an ExternalID. The External ID should be a unique value. It is recommended that you use a GUID for this value.  See Online UUID Generator Tool as a example of a proper GUID. Note: In Postman you can use the function ” {{$guid}}” to automatically generate one.

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “POST”
  4. For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/scim/Users
    Replace the Tenant URL with your URL
    Replace the ID with the ID from the step 4 in this section.
    ie. https://dsas.vmwareidentity.com//SAAS/jersey/manager/api/scim/Users
  5. Set the Content-Type to “application/json”
  6. Use the following as a sample and don’t forget to create a Unique External ID.
{  
  "schemas": [  
    "urn:scim:schemas:core:1.0",  
    "urn:scim:schemas:extension:workspace:tenant:sva:1.0",  
    "urn:scim:schemas:extension:workspace:1.0",  
    "urn:scim:schemas:extension:enterprise:1.0"  
  ],  
  "externalId": "{{$guid}}",  
  "userName": "testing6@mydomain.com",  
  "name": {  
    "givenName": "test6",  
    "familyName": "last6"  
  },  
  "emails": [  
    {  
      "value": "testing6@mydomain.com"  
    }  
  ],  
  "urn:scim:schemas:extension:workspace:1.0": {  
        "internalUserType": "PROVISIONED",  
        "domain": "1dsavm.com",  
        "userPrincipalName": "testing6@mydomain.com"  
      }  
}  

Creating an Other Directory

When you configure UEM to integrate with Identity Manager an “Other” Directory should be automatically created. If in the case it is not created, you can create one via the API as well.

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “POST”
  4. For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/connectormanagement/directoryconfigs
    Replace the Tenant URL with your URL

    ie. https://dsas.vmwareidentity.com/SAAS/jersey/manager/api/connectormanagement/directoryconfigs
  5. Set the Content-Type to “application/vnd.vmware.horizon.manager.connector.management.directory.other+json
  6. Use the following as a sample
{  
"type":"OTHER_DIRECTORY",  
"domains":["SteveTestDomain2"],  
"name":"SteveTest2"  
}

Create SCIM Groups

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “POST”
  4. For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/scim/Groups
    Replace the Tenant URL with your URL
    ie. https://dsas.vmwareidentity.com//SAAS/jersey/manager/api/scim/Groups
  5. Set the Content-Type to “application/json”
  6. Use the following as a sample:
{  
  "schemas": [  
    "urn:scim:schemas:core:1.0",
    "urn:scim:schemas:extension:workspace:1.0"  
  ],  
  "displayName": "pmGroup2",  
   "urn:scim:schemas:extension:workspace:1.0": {  
        "domain": "mydomain.com"
      }  
} 

Adding SCIM Users to SCIM Groups

In order to add a SCIM user to a SCIM group, we need to know the “id” for both the user and group.

Get ID For User

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “GET”
  4. Enter the following for the URL: https://TENANTURL/SAAS/jersey/manager/api/scim/Users?filter=username%20eq%20%22MyUserID%22
    Replace MyUserID with a username in your environment
    ie. https://dsas.vmwareidentity.com/SAAS/jersey/manager/api/scim/Users?filter=username%20eq%20%22bbuser1%22
  5. This will return a complete result set of attributes for the particular user.
  6. Retrieve the ID for the User.

Get ID for Group

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “GET”
  4. Enter the following for the URL: https://TENANTURL/SAAS/jersey/manager/api/scim/Groups?filter=displayName%20eq%20%22GroupName%22
    Replace GroupName with a group in your environment
    ie. https://dsas.vmwareidentity.com/SAAS/jersey/manager/api/scim/Groups?filter=displayName%20eq%20%22pmgroup2%22
  5. This will return a complete result set of attributes for the particular group.
  6. Retrieve the ID for the Group.

Add User to Group

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “PATCH”
  4. Enter the following for the URL: https://TENANTURL/SAAS/jersey/manager/api/scim/Groups/IDforGroup
    Replace IDforGroup with the Group ID in the previous section.
    ie. https://dsas.vmwareidentity.com/SAAS/jersey/manager/api/scim/Groups/236dca5e-426a-4d00-b0ec-105aa8748f37
  5. Use the following as a sample – Use the ID for the user you retrieved in the previous section
{
    "schemas": [
        "urn:scim:schemas:core:1.0"
    ],
    "members": [
        {
            "value": "b4ec7855-e281-47bd-8307-26b9b68a2de8"
        }
    ]
}

Other Useful API Calls

Delete AirWatch Configuration from Workspace ONE Access

Note: This API call will delete the AirWatch Configuration from Workspace ONE Access. It will not delete any of the configuration from Workspace ONE UEM. If you delete this configuration, you will not be able to run the Wizards from UEM again. Please use with Caution.

  1. Open a new Tab in Postman
  2. Add the Authorization Header as per the previous section.
  3. For the HTTP Method, select “DELETE”
    For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/tenants/tenant/airwatchoptin/config
    Replace the Tenant URL with your URL
  4. Set the Content-Type to “application/vnd.vmware.horizon.manager.tenants.tenant.airwatchoptin.config+json;charset=UTF-8”
  5. Click Send
  6. You should receive an HTTP 205 response
  7. Your Workspace ONE UEM Section should now be blank:
  1. Once you’ve updated your Workspace ONE UEM section with the new server details, on some occasions your Device Compliance Authentication Method might still be pointing to your old environment. In this case, toggle your Device Compliance Authentication Method (Enabled/Disabled) and Save each time.
  1. Once you’ve updated your Workspace ONE UEM section with the new server details, verify your in your Hub Settings that you have the correct information

Troubleshooting

It would be impossible to discuss every combination of errors that can be returned using the API. Here are a few common ones:

  1. If you receive the error “User is not authorized to perform the task.”.
    This error typically means that your Oauth Token has expired. Regenerate your OAuth Token.  If you have used the browser cookies method to get your token, ensure that your HZN cookie is from the administrative interface.
  2. When doing an update user, you receive the error “”???UNSUPPORTED_MEDIA_TYPE???””
    This error means that you are sending a blank or incorrect Content-Type. Check to make sure the content-type is set to “application/json”

7 thoughts on “Using Postman to Manage Workspace ONE Identities

Leave a Reply to steveidm Cancel reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s