A pageToken value that can be used to request the next page of results. Only returned if there are more results to return.
previous
String
A pageToken value that can be used to request the previous page of results. Only returned if there is a previous page.
meta
Field
Type
Description
status
Number
The function level status of the request.
data
Field
Type
Description
option
String
The action taken by a policy.
id
String
The Mimecast secure id of the Address Alteration Set (folder) that will be applied by this policy
policy
Policy Details Object
An object of conditions that determine when to apply the alteration set
Policy Details Object
Field
Type
Description
enforced
Boolean
Is the policy enforced
bidirectional
String
Should the policy also apply in reverse email flow of the definied by this policy
toDate
Date String
The end date that the policy should cease to apply in ISO 8601 date time format (e.g. 2011-12-03T10:15:30+0000)
description
String
The description for the policy (name)
toEternal
Boolean
Should the policy continue to apply, regardless of the current date and time
enabled
Boolean
Should the policy be considered for emails processing through Mimecast
fromDate
Date String
The start date that the policy should begin to apply in ISO 8601 date time format (e.g. 2011-12-03T10:15:30+0000)
fromPart
String
Should the sender address be considered based on the envelope, header or either address
fromEternal
Boolean
Should the policy start to apply, regardless of the current date and time
fromType
String
The sender address type (e.g. envelope or header). Will be envelope_from, header_from or both.
fromValue
String
The value that the sender address will be compared against
from
Policy Target Object
Scope of application based on the sender address
toType
String
The component of the recipient address object that this policy should be scoped
toValue
String
The value that the recipient address will be compared against
to
Policy Target Object
Scope of application based on the recipient address
override
Boolean
Should the policy be considered for application, and apply if conditions met, prior to other policies of the same type
conditions
Policy Conditions Object
Conditions of the sending platform to determine if the policy should be considered
createTime
Date String
The creation timestamp of the policy in ISO 8601 date time format (e.g. 2011-12-03T10:15:30+0000)
lastUpdated
String
The most recent modification timestamp of the policy in ISO 8601 date time format (e.g. 2011-12-03T10:15:30+0000)
Policy Target Object
Field
Type
Description
emailAddress
String
The email address to apply the policy based on
emailDomain
String
The email domain to apply the policy based on
group
Group Object
The group to which the policy is scoped
attribute
Attribute Object
The address object attribute to apply this policy based on
type
String
The component of the address object that this policy should be scoped
Attribute Object
Field
Type
Description
name
String
The name of the user address attribute to compare value
id
String
The Mimecast secure id of the user address attribute
value
String
The value to which the user address attribute should equal
Policy Conditions Object
Field
Type
Description
spfDomains
Array of Strings
An array of SPF records to reference when checking the source IP address
Group Object
Field
Type
Description
folders
Array of Group Objects
An array of all sub-groups for the current group.
userCount
Number
The number of users in the current group.
description
String
The name of the current group.
id
String
The Mimecast secure id of the current group.
source
String
The source of the current group. Will be cloud or ldap.
folderCount
Number
The number of sub-groups within the current group.
parentId
String
The Mimecast secure id of the parent group.
Sample Code
Sample code is provided to demonstrate how to use the API and is not representative of a production application. To use the sample code; complete the required variables as described, populate the desired values in the request body, and execute in your favorite IDE. Please see the Global Base URL's page to find the correct base URL to use for your account.
POST {base_url}/api/policy/antispoofing-bypass/get-policy
Authorization: MC {accesskKey}:{Base64 encoded signed Data To Sign}
x-mc-date: {dateTime}
x-mc-req-id: {unique id}
x-mc-app-id: {applicationId}
Content-Type: application/json
Accept: application/json
{
"data":[
{
"id": "String"
}
]
}
import base64
import hashlib
import hmac
import uuid
import datetime
import requests
# Setup required variables
base_url = "https://xx-api.mimecast.com"
uri = "/api/policy/antispoofing-bypass/get-policy"
url = base_url + uri
access_key = "YOUR ACCESS KEY"
secret_key = "YOUR SECRET KEY"
app_id = "YOUR APPLICATION ID"
app_key = "YOUR APPLICATION KEY"
# Generate request header values
request_id = str(uuid.uuid4())
hdr_date = datetime.datetime.utcnow().strftime("%a, %d %b %Y %H:%M:%S") + " UTC"
# DataToSign is used in hmac_sha1
dataToSign = ':'.join([hdr_date, request_id, uri, app_key])
# Create the HMAC SHA1 of the Base64 decoded secret key for the Authorization header
hmac_sha1 = hmac.new(base64.b64decode(secret_key), dataToSign.encode(), digestmod=hashlib.sha1).digest()
# Use the HMAC SHA1 value to sign the hdrDate + ":" requestId + ":" + URI + ":" + appkey
sig = base64.b64encode(hmac_sha1).rstrip()
# Create request headers
headers = {
'Authorization': 'MC ' + access_key + ':' + sig.decode(),
'x-mc-app-id': app_id,
'x-mc-date': hdr_date,
'x-mc-req-id': request_id,
'Content-Type': 'application/json'
}
payload = {
'data': [
{
"id": "String"
}
]
}
r = requests.post(url=url, headers=headers, data=str(payload))
print(r.text)
static void Main(string[] args)
{
//Setup required variables
string baseUrl = "https://xx-api.mimecast.com";
string uri = "/api/policy/antispoofing-bypass/get-policy";
string accessKey = "YOUR ACCESS KEY";
string secretKey = "YOUR SECRET KEY";
string appId = "YOUR APPLICATION ID";
string appKey = "YOUR APPLICATION KEY";
//Generate request header values
string hdrDate = System.DateTime.Now.ToUniversalTime().ToString("R");
string requestId = System.Guid.NewGuid().ToString();
//Create the HMAC SHA1 of the Base64 decoded secret key for the Authorization header
System.Security.Cryptography.HMAC h = new System.Security.Cryptography.HMACSHA1(System.Convert.FromBase64String(secretKey));
//Use the HMAC SHA1 value to sign the hdrDate + ":" requestId + ":" + URI + ":" + appkey
byte[] hash = h.ComputeHash(System.Text.Encoding.Default.GetBytes(hdrDate + ":" + requestId + ":" + uri + ":" + appKey));
//Build the signature to be included in the Authorization header in your request
string signature = "MC " + accessKey + ":" + System.Convert.ToBase64String(hash);
//Build Request
System.Net.HttpWebRequest request = (System.Net.HttpWebRequest)System.Net.WebRequest.Create(baseUrl + uri);
request.Method = "POST";
request.ContentType = "application/json";
//Add Headers
request.Headers[System.Net.HttpRequestHeader.Authorization] = signature;
request.Headers.Add("x-mc-date", hdrDate);
request.Headers.Add("x-mc-req-id", requestId);
request.Headers.Add("x-mc-app-id", appId);
//Add request body
//Create and write data to stream
string postData = @"{
""data"": [
{
""id"": ""String""
}
]
}";
byte[] payload = System.Text.Encoding.UTF8.GetBytes(postData);
System.IO.Stream stream = request.GetRequestStream();
stream.Write(payload, 0, payload.Length);
stream.Close();
//Send Request
System.Net.HttpWebResponse response = (System.Net.HttpWebResponse)request.GetResponse();
//Output response to console
System.IO.StreamReader reader = new System.IO.StreamReader(response.GetResponseStream());
string responseBody = "";
string temp = null;
while ((temp = reader.ReadLine()) != null)
{
responseBody += temp;
};
System.Console.WriteLine(responseBody);
System.Console.ReadLine();
}