Query Parameters
Available options:
microsoft-teams, google-alert-center, reversing-labs, jamf-protect, jamf-pro, thinkst-canary, generic-json, box, hyas-protect, checkpoint-harmony, sms, wirespeed, vectra, wiz, microsoft, ipinfo, cisco-umbrella, jira-data-center, windows-event-logs, crowdstrike-falcon, cisco-duo, cisco-meraki, fortianalyzer, jira-cloud, microsoft-entra, have-i-been-pwned, manage-engine-ad-audit-plus, google-directory, mimecast, okta, sentinel-one, slack, aws, kandji, wordfence, generic-syslog, cisco-catalyst, connectwise-psa, email, fortinet Body
application/json
Fields for other type integration configuration
Response
Unique identifier for the integration
Integration platform type
Available options:
microsoft-teams, google-alert-center, reversing-labs, jamf-protect, jamf-pro, thinkst-canary, generic-json, box, hyas-protect, checkpoint-harmony, sms, wirespeed, vectra, wiz, microsoft, ipinfo, cisco-umbrella, jira-data-center, windows-event-logs, crowdstrike-falcon, cisco-duo, cisco-meraki, fortianalyzer, jira-cloud, microsoft-entra, have-i-been-pwned, manage-engine-ad-audit-plus, google-directory, mimecast, okta, sentinel-one, slack, aws, kandji, wordfence, generic-syslog, cisco-catalyst, connectwise-psa, email, fortinet Whether the integration is enabled
ID of the team that owns this integration
Integration configuration metadata
Whether a permissions update is available for this integration
Explanation for why a permissions update is available
Identity fields that uniquely identify this integration instance
Name of the team that owns this integration
Whether the integration requires additional configuration