Checking current roles of a user account

  1. Authenticate to the cloud platform via the Python shell.

    The following variables should be available now:

    >>> base_url  # the base URL of the API
    >>> auth  # the 'Authorization' header value with the access token
    {'Authorization': 'Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6ImMwMD...'}
    >>> tenant_id  # the UUID of the tenant to which the token provides access
  2. Assign the user_id variable the UUID of a user account created via the API or a user account found via search:

    >>> user_id = created_user_id
    >>> user_id
  3. Send a GET request to the /users/{user_id}/access_policies endpoint:

    >>> response = requests.get(f'{base_url}/users/{user_id}/access_policies', headers=auth)
  4. Check the status code of the response:

    >>> response.status_code

    Status code 200 means that the request was successful.

    A different status code means that an error has occurred. For the details, refer to “Status and error codes”.

    Also, the response body contains the items array of current access policy objects formatted as a JSON text. When converted to an object, it will look as follows:

    >>> pprint.pprint(response.json())
    {'items': [{'id': '00000000-0000-0000-0000-000000000000',
                'issuer_id': '00000000-0000-0000-0000-000000000000',
                'role_id': 'partner_admin',
                'tenant_id': 'ede9f834-70b3-476c-83d9-736f9f8c7dae',
                'trustee_id': '1c234e69-5469-424a-a6d1-ff5658b387a6',
                'trustee_type': 'user',
                'version': 0}]}

    The role_id attribute contains current role of the user account.