A Python SDK for interacting with Cisco Secure Access APIs.
First, install the required dependencies:
pip install -r requirements.txt
Install via Setuptools.
python setup.py install --user
Set up your API credentials by using environment variables:
export CLIENT_ID="your_client_id" export CLIENT_SECRET="your_client_secret"
The SDK supports automatic retry with exponential backoff using urllib3's Retry class. Configure retries using the retries parameter in Configuration:
from urllib3.util.retry import Retry from secure_access.configuration import Configuration from secure_access.api_client import ApiClient configuration = Configuration( access_token=access_token, retries=Retry( total=3, # Maximum number of retry attempts backoff_factor=3, # Wait time multiplier between retries: {backoff_factor} * (2 ** (retry_number - 1)) seconds. With factor=3: 0s, 3s, 6s delays status_forcelist=[429], # HTTP status codes that trigger a retry (429 = Too Many Requests / rate limited) allowed_methods=["GET", "POST"] # HTTP methods that are allowed to be retried ) ) api_client = ApiClient(configuration=configuration)
To disable retry, omit the retries parameter or set it to None.
The examples/ folder contains sample scripts demonstrating various use cases with the Cisco Secure Access SDK:
Backup and restore access rules
python examples/access_rule_backup_restore.py -h
usage: access_rule_backup_restore.py [-h] -t {backup,restore} [-o OFFSET] [-l LIMIT] [-r RULES [RULES ...]]
Utility to backup and restore access rules
options:
-h, --help show this help message and exit
-t {backup,restore}, --type {backup,restore}
Type of the operation to be performed i.e. either backup or restore the access rules.
-o OFFSET, --offset OFFSET
Starting offset to fetch the access rules
-l LIMIT, --limit LIMIT
limit to fetch the access rules in a call
-r RULES [RULES ...], --rules RULES [RULES ...]
list of rule id's to filter the Access RulesBackup roaming computer configurations
python examples/roaming_computers_backup.py -h
usage: roaming_computers_backup.py [-h] --operation {backup,filter,complex-filter,analyze} [--page-size PAGE_SIZE] [--name NAME]
[--status STATUS] [--swg-status SWG_STATUS] [--last-sync-before LAST_SYNC_BEFORE]
[--last-sync-after LAST_SYNC_AFTER] [--filter-key FILTER_KEY] [--filter-value FILTER_VALUE]
[--filter-expression FILTER_EXPRESSION] [--backup-file BACKUP_FILE] [--apply-simple-filter]
[--apply-complex-filter]
Utility to backup roaming computers and apply filters
options:
-h, --help show this help message and exit
--operation {backup,filter,complex-filter,analyze}
Operation to perform
--page-size PAGE_SIZE
Number of records per page (max: 100)
--name NAME Filter by roaming computer name
--status STATUS Filter by DNS-layer security status
--swg-status SWG_STATUS
Filter by Internet security (SWG) status
--last-sync-before LAST_SYNC_BEFORE
Filter by last sync before this date (YYYY-MM-DD or YYYY-MM-DD HH:MM:SS)
--last-sync-after LAST_SYNC_AFTER
Filter by last sync after this date (YYYY-MM-DD or YYYY-MM-DD HH:MM:SS)
--filter-key FILTER_KEY
Key to filter on (supports dot notation for nested keys)
--filter-value FILTER_VALUE
Value to match for filtering
--filter-expression FILTER_EXPRESSION
Complex filter expression with logical operators and time functions
--backup-file BACKUP_FILE
Custom backup file name
--apply-simple-filter
Apply simple filter immediately after backup
--apply-complex-filter
Apply complex filter immediately after backupManage destination lists
python examples/destination_lists_manager.py -h
usage: destination_list_manager.py [-h] {destination-lists,destinations} ...
Cisco Secure Access Destination Management Tool
positional arguments:
{destination-lists,destinations}
Available commands
destination-lists Manage destination lists
destinations Manage destinations
options:
-h, --help show this help message and exitManage API keys and administrative functions
python examples/key_admin_api.py
The following include examples and samples that can help you when interacting or building integrations with Cisco Secure Access. These samples, scripts, collections and guides are supplied to customers as examples which customers are free to use or modify for use with your existing subscriptions under the terms of the attached license and the Cisco DevNet Terms Of Service.
Owner
Contributors
Categories
SecurityProducts
Cisco Secure AccessLicense
Code Exchange Community
Get help, share code, and collaborate with other developers in the Code Exchange community.View Community