Event Format: Changes on Access Rules Alerts

NameTypeDescriptionExample
specversionstringThe version of the Alert schema.1.0
typestringThe type of the alert.secureaccess.alerts.accessrulechanges.v1
sourcestringThe unique label that describes the source of the alerts.secureaccess.alerts
orgidintegerThe unique identifier of the organization.8332025
integrationidstringThe unique identifier of the integration.webhook.v1:c767741d-3f60-4050-acfe-1d8c07864f63
idstringThe unique identifier for the alert.231eeb98-bb5f-515d-b62d-17f624790452
timestringThe date and time when the system sent the event. The system reports the timestamp in the ISO 8601 format.2025-10-29T14:26:17Z
dataContentTypestringThe type of the content in the alert message.application/json
dataobjectThe properties of the data for the alert.

data

NameTypeDescriptionExample
alertsarrayThe list of Changes on Access Rules alert messages.

data.alerts

NameTypeDescriptionExample
statusstringThe label that describes the status of the alert.Active
severitystringThe label that describes the severity of the alert.Low
ruleNamestringThe name of the alert rule.rule one
ruleIdstringThe unique identifier of the alert rule that triggered the alert.2048
alertTypestringThe type of the condition that triggered the alert.More than 1 client using an API credential
redirectUrlstringThe URL of the alert rule in the Secure Access organization.https://dashboard.int.sse.cisco.com/org/1234567/proactive-alert-management/rules/256
timestringThe date and time when the system recorded the alert. The system reports the timestamp in the ISO 8601 format.2025-10-29T14:26:17Z
categorystringThe description of the category of the alert.API anomaly
changesMadestringThe label that describes the changes on the access rules.Rule changed
alertIdstringThe unique identifier of the alert.2048.8332025.1761747977000
conditionsAppliedobjectThe properties of the conditions that triggered the alert.
userstringThe user account that changed the access rules.1288271f-2d23-4619-9ecb-ab8428ede70e

data.alerts.conditionsApplied

NameTypeDescriptionExample
conditionsarray(string)The description of the condition that triggered the alert.Access rule : 1288271f-2d23-4619-9ecb-ab8428ede70e