Homepage 5 API Documentation 5 Authentication



Before you can start making API calls to Action1 resources, you must authenticate yourself with API credentials you’ve generated in the Action1 console.

Note: the examples below were adopted for cURL. You can use any API tool and platform of your choice.

To authenticate yourself in the system:

1. From a command  prompt, run the following command, replacing:

    • CLIENT-ID with the Client ID you generated on the API Credentials page
    • CLIENT-SECRET with the Client Secret, you generated on the API Credentials page

curl -XPOST -H "Content-Type:application/x-www-form-urlencoded" -d "client_id=CLIENT-ID&client_secret=CLIENT-SECRET" https://app.action1.com/api/3.0/oauth2/token

This command returns an API response:

  "access_token": "JWT-TOKEN",
  "refresh_token": "TOKEN",
  "expires_in": 3600,
  "token_type": "bearer"

2. Copy the JWT-TOKEN token and pass it as a header (Authorization: Bearer JWT-TOKEN) in every subsequent API call.

For example:

curl -XGET -H "Authorization: Bearer JWT-TOKEN" https://app.action1.com/api/3.0/organizations

cloud patch management solutions action1

RMM Solution for MSPs

Centralize endpoint management and boost efficiency of IT service delivery.

automated server patch management action compliance

Patch Management

Identify and deploy missing OS and third-party software updates.

cloud software deployment tools windows

Software Deployment

Distribute software and updates across managed endpoints.

software distribution tools software inventory action1

IT Asset Inventory

Keep a detailed inventory and manage hardware and software assets.

web client remote desktop

Remote Desktop

Support users via seamless remote desktop connection.

web based rdp client

Unattended Access

Provide administrative support and manage remote devices.

automated patch management action1

Endpoint Management

Run PowerShell, custom scripts, reboot computers and restart services.

API integrations action1


Integrate Action1 RMM to your IT ecosystem.

computer inventory tool for compliance

Reports and Alerts

Conduct endpoint security audits with comprehensive reporting.