Note: These steps are documented for legacy integrations. For authenticating new integrations, we recommend the Managing API Applications KB Article.
When developing a script of server application integration you will,
- use a single user that has the Mimecast administrator permissions to perform the actions required by your use case.
- update the Authentication Cache TTL setting in the service user's effective Authentication Profile to "Never Expire."
This page provides a step by step guide to prepare a user for your integration and get the access key and secret key values required to authorize all requests to the API.
Step 1: Create a new user
- Login to the Administration Console.
- Navigate to the Administration | Directories | Internal Directories menu item to display a list of internal domains.
- Select the internal domain where you would like to create your new user.
- Select the New Address button from the menu bar.
- Complete the new address form and select Save and Exit to create the new user.
- Keep a note of the password set as you will use this to get your Authentication Token in Step 6.
Step 2: Add the user to an Administrative Role
- While logged into the Administration Console, navigate to the Administration | Account | Roles menu item to display the Roles page.
- Right click the Basic Administrator role and select Add users to role.
- Browse or search to find the new user created in the Step 1.
- Select the tick box to the left of the user.
- Select the Add selected users button to add the user to the role.
Step 3: Create a new group and add your new user
- While logged into the Administration Console, navigate to the Administration | Directories | Profile Groups menu item to display the Profile groups page.
- Create a new group by selecting the plus icon on the parent folder where you would like to create the group. This creates a new group with the Name "New Folder"
- To rename the group, select the newly created "New Folder" group. Then from the Edit group text box type the name you want to give the folder, for example Splunk Admin and press the Enter key to apply the change.
- With the group selected select the Build drop down button and select Add Email Addresses.
- Type the name of the new user created in Step 1.
- Select Save and Exit to add the new user to the group.
Step 4: Create a new Authentication Profile
- While logged into the Administration Console, navigate to the Administration | Services | Applications menu item to display the Application Settings page.
- Select the Authentication Profiles button.
- Select the New Authentication Profile button.
- Type a Description for the new profile.
- Set the Authentication TTL setting to Never Expires. This will make sure that when you create your Authentication Token it will not expire and impact the data collection of the app.
- Leave all other settings as their default.
- Select Save and Exit to create the profile.
Step 5: Create a new Application Setting
- While logged into the Administration Console, navigate to the Administration | Services | Applications menu item to display the Application Settings page.
- Select the New Application Settings button.
- Type a Description.
- Use the Group Lookup button to select the Group that you created in Step 3.
- Use the Authentication Profile Lookup button to select the Authentication Profile created in Step 4.
- Leave all other settings as their default.
- Select Save and Exit to create and apply the Application Settings to your new group and user.
Step 6: Get your authentication token
Now that you have a dedicated user who will receive a an Authentication Token that will never expire, the final preparation task is to get the Authentication Token for the user.
Get an Authentication token using Windows
NOTE: This process has been tested in Powershell version 4 and 5.
- Copy paste the following script into a Powershell window:
$appId = Read-Host -Prompt 'Input your registered application id'
$creds = Get-Credential
$discoverPostBody = @{"data" = ,@{"emailAddress" = $creds.UserName}}
$discoverPostBodyJson = ConvertTo-Json $discoverPostBody
$discoverRequestId = [GUID]::NewGuid().guid
$discoverRequestHeaders = @{"x-mc-app-id" = $appId; "x-mc-req-id" = $discoverRequestId; "Content-Type" = "application/json"}
$discoveryData = Invoke-RestMethod -Method Post -Headers $discoverRequestHeaders -Body $discoverPostBodyJson -Uri "https://api.mimecast.com/api/login/discover-authentication"
$baseUrl = $discoveryData.data.region.api
$keys = @{}
$uri = $baseUrl + "/api/login/login"
$requestId = [GUID]::NewGuid()
$netCred = $creds.GetNetworkCredential()
$PlainPassword = $netCred.Password
$credsBytes = [System.Text.Encoding]::ASCII.GetBytes($creds.UserName + ":" + $PlainPassword)
$creds64 = [System.Convert]::ToBase64String($credsBytes)
$headers = @{"Authorization" = "Basic-Cloud " + $creds64; "x-mc-app-id" = $appId; "x-mc-req-id" = $requestId; "Content-Type" = "application/json"}
$postBody = @{"data" = ,@{"username" = $creds.UserName}}
$postBodyJson = ConvertTo-Json $postBody
$data = Invoke-RestMethod -Method Post -Headers $headers -Body $postBodyJson -Uri $uri
"Meta: " + $data.meta
"Access key: " + $data.data.accessKey
"Secret key: " + $data.data.secretKey
"Fail: " + $data.fail.errorss
- When prompted, enter the Application ID value received when you registered your application.
- Enter the email address and password of the user created in Step 1: Create a new user into the Windows credentials box that will launch after you have pasted the script into the Powershell window.
- Copy and paste the accessKey and secretKey values printed at the bottom of the Powershell window to use in your application.
IMPORTANT: be sure to copy and paste these values to a text editor and remove any line breaks caused by your Powershell window size before using the values.
Getting an Authentication token using Mac OSX or *nix systems
-
Open a terminal application and type the following command to generate a base64 encoded string of your administrators email address and password:
echo -n 'email_address:password' | openssl base64
Where email_address is the email address of the user created in Step 1 and password is the password created for the user in Step 1. Be sure to include the ":" between the email_address and password as authentication will fail without it.
-
Type the following command to use cURL to login to the Mimecast API and get your Authentication Token.
curl -i -H 'Authorization: Basic-Cloud base64_encoded_username_password' -H 'x-mc-app-id: app_id' -H 'Content-Type:application/json' https://xx-api.mimecast.com/api/login/login --data-binary '{"data":[{"username": "email_address"}]}'
Where:
base64_encoded_username_password is the value generated in step 1.
app_id is your Application ID value received when you registered your application.
xx-api is the base url for the region where your Mimecast account is hosted as documented in the System Requirements section.
email_address is the email address of the user created in Step 1: Create a new user. -
An example response to this command is:
HTTP/1.1 200 OK Content-Type: application/json Cache-control: no-store Pragma: no-cache Content-Length: 375 Content-MD5: 124911b164dbd3b9e823610a2eb4996a Date: Mon, 25 Jul 2016 16:19:37 +0100 Connection: Keep-Alive {"meta":{"status":200},"data":[{"accessKey":"LOWgx__TRUNCATED__Ect2nN","secretKey":"jD9DVicE2__TRUNCATED__EJdC4e/Q\u003d\u003d","duration":3153600000000,"bindingType":"one_step","extendOnValidate":false}],"fail":[]}
Copy and paste the accessKey and secretKey values from the response to use in your application.
IMPORTANT: make sure to replace the \u003d\u003d at the end of the secret key with ==
(\u003d is the uri encoding for the = symbol and is printed to the terminal, however the actual string should contain the = symbol when used)