<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 404 on all v0 &amp;amp; v1 Secure Endpoint API's in User and Endpoint Protection</title>
    <link>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980833#M20</link>
    <description>&lt;P&gt;The 401 for other regions would be expected AFAIK.&lt;BR /&gt;Definitely odd...I copy/pasted your request, added credentials and it worked fine.&amp;nbsp; Are you logged into SecureX as the main admin, when you create the API key?&lt;BR /&gt;I would note the &lt;STRONG&gt;content-type&lt;/STRONG&gt; header is extraneous, as that applies only to request bodies - there isn't one for this request...but that doesn't seem to matter.&lt;/P&gt;</description>
    <pubDate>Mon, 18 Dec 2023 20:17:38 GMT</pubDate>
    <dc:creator>dstaudt</dc:creator>
    <dc:date>2023-12-18T20:17:38Z</dc:date>
    <item>
      <title>404 on all v0 &amp; v1 Secure Endpoint API's</title>
      <link>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980291#M17</link>
      <description>&lt;P&gt;I am able to connect &amp;amp; use the v3 API (different cred/token, but proof I can work with an API), but I cannot get the v0 or the v1 API's to give me anything but a 404.&lt;/P&gt;
&lt;P&gt;```&lt;BR /&gt;curl -v \&lt;BR /&gt;-H 'accept: application/json' \&lt;BR /&gt;-H 'content-type: application/json' \&lt;BR /&gt;--compressed -H 'Accept-Encoding: gzip, deflate' \&lt;BR /&gt;-u &amp;lt;client_id&amp;gt;:&amp;lt;api_key&amp;gt; \&lt;BR /&gt;&lt;A href="https://api.amp.cisco.com/v1/computers" target="_blank"&gt;https://api.amp.cisco.com/v1/computers&lt;/A&gt;&lt;BR /&gt;```&lt;/P&gt;
&lt;P&gt;```&lt;BR /&gt;&lt;SPAN&gt;* Trying 192.111.4.8:443...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;* Connected to api.amp.cisco.com (192.111.4.8) port 443&lt;BR /&gt;* ALPN: curl offers h2,http/1.1&lt;BR /&gt;* (304) (OUT), TLS handshake, Client hello (1):&lt;BR /&gt;* CAfile: /etc/ssl/cert.pem&lt;BR /&gt;* CApath: none&lt;BR /&gt;* (304) (IN), TLS handshake, Server hello (2):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Certificate (11):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Server key exchange (12):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Server finished (14):&lt;BR /&gt;* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):&lt;BR /&gt;* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):&lt;BR /&gt;* TLSv1.2 (OUT), TLS handshake, Finished (20):&lt;BR /&gt;* TLSv1.2 (IN), TLS change cipher, Change cipher spec (1):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Finished (20):&lt;BR /&gt;* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;* ALPN: server accepted h2&lt;BR /&gt;* Server certificate:&lt;BR /&gt;* subject: CN=amp.cisco.com; O=Cisco Systems Inc.; L=San Jose; ST=California; C=US&lt;BR /&gt;* start date: Jul 18 21:12:37 2023 GMT&lt;BR /&gt;* expire date: Jul 17 21:11:37 2024 GMT&lt;BR /&gt;* subjectAltName: host "api.amp.cisco.com" matched cert's "api.amp.cisco.com"&lt;BR /&gt;* issuer: C=US; O=IdenTrust; OU=HydrantID Trusted Certificate Service; CN=HydrantID Server CA O1&lt;BR /&gt;* SSL certificate verify ok.&lt;BR /&gt;* using HTTP/2&lt;BR /&gt;* Server auth using Basic with user '&amp;lt;REMOVED&amp;gt;'&lt;BR /&gt;* [HTTP/2] [1] OPENED stream for &lt;A href="https://api.amp.cisco.com/v1/computers" target="_blank"&gt;https://api.amp.cisco.com/v1/computers&lt;/A&gt;&lt;BR /&gt;* [HTTP/2] [1] [:method: GET]&lt;BR /&gt;* [HTTP/2] [1] [:scheme: https]&lt;BR /&gt;* [HTTP/2] [1] [:authority: api.amp.cisco.com]&lt;BR /&gt;* [HTTP/2] [1] [:path: /v1/computers]&lt;BR /&gt;* [HTTP/2] [1] [authorization: Basic &amp;lt;REMOVED&amp;gt;]&lt;BR /&gt;* [HTTP/2] [1] [user-agent: curl/8.4.0]&lt;BR /&gt;* [HTTP/2] [1] [accept: application/json]&lt;BR /&gt;* [HTTP/2] [1] [content-type: application/json]&lt;BR /&gt;* [HTTP/2] [1] [accept-encoding: gzip, deflate]&lt;BR /&gt;&amp;gt; GET /v1/computers HTTP/2&lt;BR /&gt;&amp;gt; Host: api.amp.cisco.com&lt;BR /&gt;&amp;gt; Authorization: Basic &amp;lt;REMOVED&amp;gt;&lt;BR /&gt;&amp;gt; User-Agent: curl/8.4.0&lt;BR /&gt;&amp;gt; accept: application/json&lt;BR /&gt;&amp;gt; content-type: application/json&lt;BR /&gt;&amp;gt; Accept-Encoding: gzip, deflate&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;lt; HTTP/2 404&lt;BR /&gt;&amp;lt; date: Sun, 17 Dec 2023 21:09:06 GMT&lt;BR /&gt;&amp;lt; content-type: application/json&lt;BR /&gt;&amp;lt; status: 404 Not Found&lt;BR /&gt;&amp;lt; cache-control: no-store&lt;BR /&gt;&amp;lt; strict-transport-security: max-age=63072000; includeSubDomains&lt;BR /&gt;&amp;lt; referrer-policy: strict-origin-when-cross-origin&lt;BR /&gt;&amp;lt; x-permitted-cross-domain-policies: none&lt;BR /&gt;&amp;lt; pragma: no-cache&lt;BR /&gt;&amp;lt; x-xss-protection: 1; mode=block&lt;BR /&gt;&amp;lt; x-request-id: 41e4a17c-6d44-4683-9a4b-d4e33c6f4077&lt;BR /&gt;&amp;lt; x-download-options: noopen&lt;BR /&gt;&amp;lt; x-frame-options: SAMEORIGIN&lt;BR /&gt;&amp;lt; x-content-type-options: nosniff&lt;BR /&gt;&amp;lt; expires: Fri, 01 Jan 1990 00:00:00 GMT&lt;BR /&gt;&amp;lt; content-encoding: gzip&lt;BR /&gt;&amp;lt;&lt;BR /&gt;* Connection #0 to host api.amp.cisco.com left intact&lt;BR /&gt;```&lt;/P&gt;
&lt;P&gt;If I send a known bad client_id/api_key, then I get a 401, so I feel that my cred must be good&lt;/P&gt;
&lt;P&gt;```&lt;BR /&gt;curl -v \&lt;BR /&gt;-H 'accept: application/json' \&lt;BR /&gt;-H 'content-type: application/json' \&lt;BR /&gt;--compressed -H 'Accept-Encoding: gzip, deflate' \&lt;BR /&gt;-u bad:key \&lt;BR /&gt;&lt;A href="https://api.amp.cisco.com/v1/computers" target="_blank"&gt;https://api.amp.cisco.com/v1/computers&lt;/A&gt;&lt;BR /&gt;* Trying 192.111.4.7:443...&lt;BR /&gt;* Connected to api.amp.cisco.com (192.111.4.7) port 443&lt;BR /&gt;* ALPN: curl offers h2,http/1.1&lt;BR /&gt;* (304) (OUT), TLS handshake, Client hello (1):&lt;BR /&gt;* CAfile: /etc/ssl/cert.pem&lt;BR /&gt;* CApath: none&lt;BR /&gt;* (304) (IN), TLS handshake, Server hello (2):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Certificate (11):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Server key exchange (12):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Server finished (14):&lt;BR /&gt;* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):&lt;BR /&gt;* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):&lt;BR /&gt;* TLSv1.2 (OUT), TLS handshake, Finished (20):&lt;BR /&gt;* TLSv1.2 (IN), TLS change cipher, Change cipher spec (1):&lt;BR /&gt;* TLSv1.2 (IN), TLS handshake, Finished (20):&lt;BR /&gt;* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256&lt;BR /&gt;* ALPN: server accepted h2&lt;BR /&gt;* Server certificate:&lt;BR /&gt;* subject: CN=amp.cisco.com; O=Cisco Systems Inc.; L=San Jose; ST=California; C=US&lt;BR /&gt;* start date: Jul 18 21:12:37 2023 GMT&lt;BR /&gt;* expire date: Jul 17 21:11:37 2024 GMT&lt;BR /&gt;* subjectAltName: host "api.amp.cisco.com" matched cert's "api.amp.cisco.com"&lt;BR /&gt;* issuer: C=US; O=IdenTrust; OU=HydrantID Trusted Certificate Service; CN=HydrantID Server CA O1&lt;BR /&gt;* SSL certificate verify ok.&lt;BR /&gt;* using HTTP/2&lt;BR /&gt;* Server auth using Basic with user 'bad'&lt;BR /&gt;* [HTTP/2] [1] OPENED stream for &lt;A href="https://api.amp.cisco.com/v1/computers" target="_blank"&gt;https://api.amp.cisco.com/v1/computers&lt;/A&gt;&lt;BR /&gt;* [HTTP/2] [1] [:method: GET]&lt;BR /&gt;* [HTTP/2] [1] [:scheme: https]&lt;BR /&gt;* [HTTP/2] [1] [:authority: api.amp.cisco.com]&lt;BR /&gt;* [HTTP/2] [1] [:path: /v1/computers]&lt;BR /&gt;* [HTTP/2] [1] [authorization: Basic YmFkOmtleQ==]&lt;BR /&gt;* [HTTP/2] [1] [user-agent: curl/8.4.0]&lt;BR /&gt;* [HTTP/2] [1] [accept: application/json]&lt;BR /&gt;* [HTTP/2] [1] [content-type: application/json]&lt;BR /&gt;* [HTTP/2] [1] [accept-encoding: gzip, deflate]&lt;BR /&gt;&amp;gt; GET /v1/computers HTTP/2&lt;BR /&gt;&amp;gt; Host: api.amp.cisco.com&lt;BR /&gt;&amp;gt; Authorization: Basic YmFkOmtleQ==&lt;BR /&gt;&amp;gt; User-Agent: curl/8.4.0&lt;BR /&gt;&amp;gt; accept: application/json&lt;BR /&gt;&amp;gt; content-type: application/json&lt;BR /&gt;&amp;gt; Accept-Encoding: gzip, deflate&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;lt; HTTP/2 401&lt;BR /&gt;&amp;lt; date: Sun, 17 Dec 2023 21:22:52 GMT&lt;BR /&gt;&amp;lt; content-type: application/json&lt;BR /&gt;&amp;lt; status: 401 Unauthorized&lt;BR /&gt;&amp;lt; cache-control: no-cache&lt;BR /&gt;&amp;lt; x-ratelimit-limit: 200&lt;BR /&gt;&amp;lt; x-ratelimit-reset: 59&lt;BR /&gt;&amp;lt; strict-transport-security: max-age=63072000; includeSubDomains&lt;BR /&gt;&amp;lt; referrer-policy: strict-origin-when-cross-origin&lt;BR /&gt;&amp;lt; x-ratelimit-remaining: 199&lt;BR /&gt;&amp;lt; x-permitted-cross-domain-policies: none&lt;BR /&gt;&amp;lt; x-xss-protection: 1; mode=block&lt;BR /&gt;&amp;lt; x-request-id: 5d9b193b-a1c3-4b46-9115-eb1577099f06&lt;BR /&gt;&amp;lt; x-download-options: noopen&lt;BR /&gt;&amp;lt; x-frame-options: SAMEORIGIN&lt;BR /&gt;&amp;lt; x-content-type-options: nosniff&lt;BR /&gt;&amp;lt; x-ratelimit-resetdate: 2023-12-17T21:23:52Z&lt;BR /&gt;&amp;lt;&lt;BR /&gt;* Connection #0 to host api.amp.cisco.com left intact&lt;BR /&gt;{"version":null,"data":{},"errors":[{"error_code":401,"description":"Unauthorized","details":["Unknown API key or Client ID"]}]}&lt;BR /&gt;```&lt;/P&gt;
&lt;P&gt;I see others talking about 404's, but I see no answers to their questions.&amp;nbsp; Can someone point me in the right direction?&lt;/P&gt;</description>
      <pubDate>Sun, 17 Dec 2023 21:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980291#M17</guid>
      <dc:creator>jimmypuckett</dc:creator>
      <dc:date>2023-12-17T21:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: 404 on all v0 &amp; v1 Secure Endpoint API's</title>
      <link>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980796#M18</link>
      <description>&lt;P&gt;That's a brand new version of Curl, but even so it seems to be working here...any chance a proxy or some other network interference is preventing you from reaching the AMP URL?&amp;nbsp; Are you perhaps in a non-US region (look under the **Servers** dropdown &lt;A href="https://developer.cisco.com/docs/secure-endpoint/#!auditlog" target="_self"&gt;here&lt;/A&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;:~/Downloads/curl-static-i686-8.5.0$ ./curl -v \
-H 'accept: application/json' \
-H 'content-type: application/json' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u redacted:redacted \
https://api.amp.cisco.com/v1/computers
* Host api.amp.cisco.com:443 was resolved.
* IPv6: (none)
* IPv4: 192.111.4.8, 192.111.4.9, 192.111.4.7
*   Trying 192.111.4.8:443...
* Connected to api.amp.cisco.com (192.111.4.8) port 443
* ALPN: curl offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
*  CAfile: /etc/ssl/certs/ca-certificates.crt
*  CApath: /etc/ssl/certs
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 / prime256v1 / rsaEncryption
* ALPN: server accepted h2
* Server certificate:
*  subject: CN=amp.cisco.com; O=Cisco Systems Inc.; L=San Jose; ST=California; C=US
*  start date: Jul 18 21:12:37 2023 GMT
*  expire date: Jul 17 21:11:37 2024 GMT
*  subjectAltName: host "api.amp.cisco.com" matched cert's "api.amp.cisco.com"
*  issuer: C=US; O=IdenTrust; OU=HydrantID Trusted Certificate Service; CN=HydrantID Server CA O1
*  SSL certificate verify ok.
*   Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
*   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
*   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption
* using HTTP/2
* Server auth using Basic with user 'redacted'
* [HTTP/2] [1] OPENED stream for https://api.amp.cisco.com/v1/computers
* [HTTP/2] [1] [:method: GET]
* [HTTP/2] [1] [:scheme: https]
* [HTTP/2] [1] [:authority: api.amp.cisco.com]
* [HTTP/2] [1] [:path: /v1/computers]
* [HTTP/2] [1] [authorization: Basic redacted]
* [HTTP/2] [1] [user-agent: curl/8.5.0]
* [HTTP/2] [1] [accept: application/json]
* [HTTP/2] [1] [content-type: application/json]
* [HTTP/2] [1] [accept-encoding: gzip, deflate]
&amp;gt; GET /v1/computers HTTP/2
&amp;gt; Host: api.amp.cisco.com
&amp;gt; Authorization: Basic redacted
&amp;gt; User-Agent: curl/8.5.0
&amp;gt; accept: application/json
&amp;gt; content-type: application/json
&amp;gt; Accept-Encoding: gzip, deflate
&amp;gt; 
&amp;lt; HTTP/2 200 
&amp;lt; date: Mon, 18 Dec 2023 18:25:12 GMT
&amp;lt; content-type: application/json
&amp;lt; status: 200 OK
&amp;lt; cache-control: no-store
&amp;lt; x-ratelimit-limit: 200
&amp;lt; x-ratelimit-reset: 59
&amp;lt; strict-transport-security: max-age=63072000; includeSubDomains
&amp;lt; referrer-policy: strict-origin-when-cross-origin
&amp;lt; x-ratelimit-remaining: 199
&amp;lt; x-permitted-cross-domain-policies: none
&amp;lt; pragma: no-cache
&amp;lt; x-xss-protection: 1; mode=block
&amp;lt; x-request-id: 40542483-efc1-4443-b425-247cfea31e73
&amp;lt; x-download-options: noopen
&amp;lt; etag: W/"c84e9ca51ec54fb5d847ba7250b3cdb6"
&amp;lt; x-frame-options: SAMEORIGIN
&amp;lt; x-content-type-options: nosniff
&amp;lt; x-ratelimit-resetdate: 2023-12-18T18:26:11Z
&amp;lt; expires: Fri, 01 Jan 1990 00:00:00 GMT
&amp;lt; strict-transport-security: max-age=31536000
&amp;lt; content-encoding: gzip
(content ommitted)&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 18 Dec 2023 18:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980796#M18</guid>
      <dc:creator>dstaudt</dc:creator>
      <dc:date>2023-12-18T18:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: 404 on all v0 &amp; v1 Secure Endpoint API's</title>
      <link>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980809#M19</link>
      <description>&lt;P&gt;Thank you for the reply.&amp;nbsp; I have tried the other ones (even though the v3 North America one works for me), and I get 401's...&lt;BR /&gt;&lt;BR /&gt;```&lt;BR /&gt;&amp;lt; HTTP/2 401&lt;BR /&gt;&amp;lt; date: Mon, 18 Dec 2023 18:58:11 GMT&lt;BR /&gt;&amp;lt; content-type: application/json&lt;BR /&gt;&amp;lt; status: 401 Unauthorized&lt;BR /&gt;```&lt;BR /&gt;&lt;BR /&gt;That is so puzzling.&amp;nbsp; I get past the auth on North America with my credentials, so I know that they are good for the region.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2023 19:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980809#M19</guid>
      <dc:creator>jimmypuckett</dc:creator>
      <dc:date>2023-12-18T19:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: 404 on all v0 &amp; v1 Secure Endpoint API's</title>
      <link>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980833#M20</link>
      <description>&lt;P&gt;The 401 for other regions would be expected AFAIK.&lt;BR /&gt;Definitely odd...I copy/pasted your request, added credentials and it worked fine.&amp;nbsp; Are you logged into SecureX as the main admin, when you create the API key?&lt;BR /&gt;I would note the &lt;STRONG&gt;content-type&lt;/STRONG&gt; header is extraneous, as that applies only to request bodies - there isn't one for this request...but that doesn't seem to matter.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2023 20:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/user-and-endpoint-protection/404-on-all-v0-amp-v1-secure-endpoint-api-s/m-p/4980833#M20</guid>
      <dc:creator>dstaudt</dc:creator>
      <dc:date>2023-12-18T20:17:38Z</dc:date>
    </item>
  </channel>
</rss>

