Download OpenAPI specification:Download
Welcome to Synerise API Reference! We hope that you'll enjoy your stay here.
If you need help with our services, feel free to contact us at support@synerise.com.
Synerise uses JSON Web Token (JWT) as the authorization method.
The token is generated by the auth/login endpoint.
You need to include it in the Authorization
header of your requests, with a Bearer
prefix.
See this simplified example of a call:
curl -X GET https://api.synerise.com/v4/clients \
-H 'Accept: application/json' \
-H 'Api-Version: 4.4' \
-H 'Authorization: Bearer eyJhbGciOiJSzZXIiLCJjdGQiOjE1NTI0NjMzMjg4NjIsImF1dGgiOiJINHNJQUFBQUFBQUFBSXVPQlFBcHUwd05BZ0FBQUE9PSIsIm5tZSI' \
-H 'Content-Type: application/json'
Remember to include a space between Bearer
and the token.
The token is valid for one hour (unless configured differently). You can request a refreshed key for the session by using the auth/refresh endpoint before the current token expires.
You can verify your JWT signature by using the public key.
Security Scheme Type | HTTP |
---|---|
HTTP Authorization Scheme | bearer |
Authorization by tracker key sent in a token
query parameter. This may be the same key as used in the tracking code of the website. For details, see this article: https://help.synerise.com/developers/web/installation-and-configuration/#creating-a-tracking-code.
Security Scheme Type | API Key |
---|---|
Query parameter name: | token |
Authenticate as a User.
Note: To perform operations within a Workspace, you must select a Workspace.
username required | string The login (email address) of the user |
password required | string The user's password |
deviceId | string Identifier of user's current device |
externalProviderToken | string |
externalProviderType | string Value: "GOOGLE" |
{- "username": "string",
- "password": "string",
- "deviceId": "string",
- "externalProviderToken": "string",
- "externalProviderType": "GOOGLE"
}
{- "consumer": {
- "type": "USER",
- "businessProfileId": 0,
- "name": "string",
- "id": 0,
- "authorities": [
- "string"
], - "roles": "string"
}, - "token": "string"
}
Authenticate as a User with multi-factor authentication.
Note: To perform operations within a Workspace, you must select a Workspace.
API consumer who can use this method: Synerise User
This method is available to all authenticated users, before and after multi-factor authentication is confirmed.
mfaType required | string Enum: "TOTP_AUTHENTICATOR" "EMAIL" Type of multi-factor authentication |
verificationCode required | string Multi-factor verification code |
deviceId | string |
externalProviderToken | string |
externalProviderType | string Value: "GOOGLE" |
{- "verificationCode": "string",
- "deviceId": "string",
- "externalProviderToken": "string",
- "externalProviderType": "GOOGLE"
}
{- "consumer": {
- "type": "USER",
- "businessProfileId": 0,
- "name": "string",
- "id": 0,
- "authorities": [
- "string"
], - "roles": "string"
}, - "token": "string"
}
After logging in as a User, select a Workspace where you want to perform operations.
API consumer who can use this method: Synerise User
This method is available to all fully-authenticated users (multifactor confirmation required, if enabled).
businessProfileUUID required | string <uuid> UUID of the workspace |
curl --request POST --url https://api.synerise.com/uauth/auth/login/user/profile/%7BbusinessProfileUUID%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "consumer": {
- "type": "USER",
- "businessProfileId": 0,
- "name": "string",
- "id": 0,
- "authorities": [
- "string"
], - "roles": "string"
}, - "token": "string"
}
Retrieve a list of Workspaces available to the user.
API consumer who can use this method: Synerise User
This method is available to all fully-authenticated users (multifactor confirmation required, if enabled).
curl --request GET --url https://api.synerise.com/uauth/business-profile/ --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "businessProfileGuid": "string",
- "logo": "string",
- "name": "string",
- "id": 0,
- "created": "2019-08-24T14:15:22Z",
- "subdomain": "string",
- "ipRestricted": true,
- "mfaRequired": true
}
]
Retrieve information about the currently selected workspace.
API consumer who can use this method: Synerise User
This method is available to all fully-authenticated users (multifactor confirmation required, if enabled).
curl --request GET --url https://api.synerise.com/uauth/business-profile/current --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "selected": true,
- "data": {
- "id": 0,
- "name": "string",
- "logo": "string",
- "businessProfileGuid": "string",
- "created": "2019-08-24T14:15:22Z",
- "subdomain": "string",
- "ipRestriction": "OFF",
- "mfaRestriction": "OFF"
}
}
Obtain a new Workspace JWT Token.
apiKey required | string Workspace API key WARNING: Workspace API keys can be used to access all customer data and manage the workspace. They should only be used for server-to-server communication in integrations. DO NOT use workspace API keys in your mobile applications or websites. |
{- "apiKey": "64c09614-1b2a-42f7-804d-f647243eb1ab"
}
{- "token": "string"
}
Retrieve a refreshed JWT Token to prolong the session.
The current token must still be active at the time of the request.
API consumers who can use this method: Profile (formerly client), Anonymous profile (formerly client)
This method does not require a Synerise authorization token.
apiKey required | string Profile (formerly "Client") API key |
{- "apiKey": "string"
}
{- "token": "string",
- "expiration": 1649283173,
- "created": 1649277173668,
- "origin": "SYNERISE",
- "customId": "card123",
- "realm": "client"
}
Obtain a new JWT for a Profile. If an account for the Profile does not exist and the identityProvider
is different than SYNERISE
, this request creates an account.
apiKey required | string Profile (formerly "Client") API key |
identityProvider required | string Enum: "SYNERISE" "FACEBOOK" "OAUTH" "APPLE" "GOOGLE" "UNKNOWN" The identity provider. |
identityProviderToken | string Third-party authentication token used to authenticate with the Identity Provider. Required if |
string Profile email. Required if | |
customId | any Profile customId. Required if |
password | string Profile password. Required if |
uuid | string Profile UUID. Required if |
deviceId | string Unique Android or iOS device ID |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
{- "apiKey": "string",
- "identityProvider": "SYNERISE",
- "identityProviderToken": "string",
- "email": "string",
- "customId": null,
- "password": "string",
- "uuid": "string",
- "deviceId": "string",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
{- "token": "eyJhbGciOiJSUzUxMiJ9.eyJzdinvalidwYmZkM2FkNDg2ZjQ3ZGRiMjE5MSIsImF1ZCI6IkFQSSIsInJsbSI6ImFub255bW91c19jbGllbnQiLCJjdGQiOjE1NTMwMDQxNTkxNTEsImVtbCI6IjYyMjM3NmY4LTAwMDAtMjIyMi1kN2Y5LTA3MGZhOTU2ZTk2M0Bhbm9ueW1vdXMuaW52YWxpZCIsImF1dGgiOiJINHNJQUFBQUFBQUFBSXVPQlFBcHUwd05BZ0FBQUE9PSIsImlzcyI6IlN5bmVyaXNlIiwiYnBpIjo0OCwiY2xJZCI6NDMzMjMwMjg4LCJleHAiOjE1NTMwMDcxNTksImFwayI6IjVBRUFBM0Q1LUUxNDctQzdFQi1ENTlFLUJDRjUwMTA5QTNEMSJ9.QOmSqrneR4mJFv4JdxTYsw_wGcDawDsVQuB-GVTcPPwijiP7lQ_Jzqq2Mypg1BS6WFlfGB8fzqCY9iMF_TdtjmoB4xBrY95ylU8L9qto-9Cw5x5TURkfxq31eryiHe2IteRAEtoVzYg2_s9QhlH6ANVcFOVp8dMno0V9bfMYfeSQa3FkjEbxFsseHkMOiADmp9-tOGtLXO942Ir-2W_Hz3Utlpt4erz0dVJBw8a-mFavPA8EEDWR7ACJNocrVHFkS3wFISh3LqLn6KkXiowaynKlJOEHGctuahzKmF3ZOJ1BvGgKohxF9OXvQs9IdmCfWhYsLr5Q2p04TJJ-MyvTipuggKVioh8mHmOFdfnN-Zused6tXzhZtKPUWTmM8cBKoAOBHExxcMQ8SVSjxnw_7_eLKm7S2wNpu0V-tiPZPCH4wYZXtWBYjmfy0V9ydjXnNunXfgxKixLeFNnONUXxEuqPLvM_xAuonQBXVN4nYrgJv8p8U6_ZlGMPjJq1szfcuBZnzI34LSEWx_nSof0XC5Czm8iG_ihG8naivNWS8h-Q-qKMP_3PPFsLSH4Egh03pH93EJUuNAeSO4RGfUX1wzMvrv1nBC1SM660uFMbq-wkplFBbKnHKMYe-qRs1-lZPG5PwPWJJdpGqOUzbnoMOJYmiq06OHHVQyJSkcEHLCk"
}
Obtain a new JWT for a Profile. This method is designed to be used from a backend server that handles login requests and communicates with Synerise to execute them.
If an account for the Profile does not exist and the identityProvider
is different than SYNERISE
, this request creates an account.
API consumer who can use this method: Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: SAUTH_SERVER_LOGIN_CLIENT_CREATE
ipAddress required | string The IP address of the client device that is logging in. |
apiKey required | string Profile (formerly "Client") API key |
identityProvider required | string Enum: "SYNERISE" "FACEBOOK" "OAUTH" "APPLE" "GOOGLE" "UNKNOWN" The identity provider. |
identityProviderToken | string Third-party authentication token used to authenticate with the Identity Provider. Required if |
string Profile email. Required if | |
customId | any Profile customId. Required if |
password | string Profile password. Required if |
uuid | string Profile UUID. Required if |
deviceId | string Unique Android or iOS device ID |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
{- "ipAddress": "string",
- "apiKey": "string",
- "identityProvider": "SYNERISE",
- "identityProviderToken": "string",
- "email": "string",
- "customId": null,
- "password": "string",
- "uuid": "string",
- "deviceId": "string",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
{- "token": "eyJhbGciOiJSUzUxMiJ9.eyJzdinvalidwYmZkM2FkNDg2ZjQ3ZGRiMjE5MSIsImF1ZCI6IkFQSSIsInJsbSI6ImFub255bW91c19jbGllbnQiLCJjdGQiOjE1NTMwMDQxNTkxNTEsImVtbCI6IjYyMjM3NmY4LTAwMDAtMjIyMi1kN2Y5LTA3MGZhOTU2ZTk2M0Bhbm9ueW1vdXMuaW52YWxpZCIsImF1dGgiOiJINHNJQUFBQUFBQUFBSXVPQlFBcHUwd05BZ0FBQUE9PSIsImlzcyI6IlN5bmVyaXNlIiwiYnBpIjo0OCwiY2xJZCI6NDMzMjMwMjg4LCJleHAiOjE1NTMwMDcxNTksImFwayI6IjVBRUFBM0Q1LUUxNDctQzdFQi1ENTlFLUJDRjUwMTA5QTNEMSJ9.QOmSqrneR4mJFv4JdxTYsw_wGcDawDsVQuB-GVTcPPwijiP7lQ_Jzqq2Mypg1BS6WFlfGB8fzqCY9iMF_TdtjmoB4xBrY95ylU8L9qto-9Cw5x5TURkfxq31eryiHe2IteRAEtoVzYg2_s9QhlH6ANVcFOVp8dMno0V9bfMYfeSQa3FkjEbxFsseHkMOiADmp9-tOGtLXO942Ir-2W_Hz3Utlpt4erz0dVJBw8a-mFavPA8EEDWR7ACJNocrVHFkS3wFISh3LqLn6KkXiowaynKlJOEHGctuahzKmF3ZOJ1BvGgKohxF9OXvQs9IdmCfWhYsLr5Q2p04TJJ-MyvTipuggKVioh8mHmOFdfnN-Zused6tXzhZtKPUWTmM8cBKoAOBHExxcMQ8SVSjxnw_7_eLKm7S2wNpu0V-tiPZPCH4wYZXtWBYjmfy0V9ydjXnNunXfgxKixLeFNnONUXxEuqPLvM_xAuonQBXVN4nYrgJv8p8U6_ZlGMPjJq1szfcuBZnzI34LSEWx_nSof0XC5Czm8iG_ihG8naivNWS8h-Q-qKMP_3PPFsLSH4Egh03pH93EJUuNAeSO4RGfUX1wzMvrv1nBC1SM660uFMbq-wkplFBbKnHKMYe-qRs1-lZPG5PwPWJJdpGqOUzbnoMOJYmiq06OHHVQyJSkcEHLCk"
}
Obtain a new JWT token for a Profile.
If the account does not exist, an account is not created.
If any additional conditions are required for logging in, the response is HTTP200 and lists the conditions.
Note that using this endpoint requires authenticating as an anonymous Profile first.
This method does not require a Synerise authorization token.
apiKey required | string Profile (formerly "Client") API key |
identityProvider required | string Enum: "SYNERISE" "FACEBOOK" "OAUTH" "APPLE" "GOOGLE" "UNKNOWN" The identity provider. |
identityProviderToken | string Third-party authentication token used to authenticate with the Identity Provider. Required if |
string Profile email. Required if | |
customId | any Profile customId. Required if |
password | string Profile password. Required if |
uuid | string Profile UUID. Required if |
deviceId | string Unique Android or iOS device ID |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
{- "apiKey": "string",
- "identityProvider": "SYNERISE",
- "identityProviderToken": "string",
- "email": "string",
- "customId": null,
- "password": "string",
- "uuid": "string",
- "deviceId": "string",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
{- "conditions": [
- "string"
], - "status": "SUCCESS",
- "token": "string",
- "expiration": 1649283173,
- "created": 1649277173668,
- "origin": "SYNERISE",
- "customId": "card123",
- "realm": "client"
}
Obtain a new JWT for an anonymous Profile. The token can be used and refreshed in the same way as tokens of registered Profiles.
apiKey required | string Profile (formerly "Client") API key |
uuid required | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
deviceId | string Unique iOS or Android device identifier. |
{- "apiKey": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "deviceId": "string"
}
{- "token": "eyJhbGciOiJSUzUxMiJ9.eyJzdinvalidwYmZkM2FkNDg2ZjQ3ZGRiMjE5MSIsImF1ZCI6IkFQSSIsInJsbSI6ImFub255bW91c19jbGllbnQiLCJjdGQiOjE1NTMwMDQxNTkxNTEsImVtbCI6IjYyMjM3NmY4LTAwMDAtMjIyMi1kN2Y5LTA3MGZhOTU2ZTk2M0Bhbm9ueW1vdXMuaW52YWxpZCIsImF1dGgiOiJINHNJQUFBQUFBQUFBSXVPQlFBcHUwd05BZ0FBQUE9PSIsImlzcyI6IlN5bmVyaXNlIiwiYnBpIjo0OCwiY2xJZCI6NDMzMjMwMjg4LCJleHAiOjE1NTMwMDcxNTksImFwayI6IjVBRUFBM0Q1LUUxNDctQzdFQi1ENTlFLUJDRjUwMTA5QTNEMSJ9.QOmSqrneR4mJFv4JdxTYsw_wGcDawDsVQuB-GVTcPPwijiP7lQ_Jzqq2Mypg1BS6WFlfGB8fzqCY9iMF_TdtjmoB4xBrY95ylU8L9qto-9Cw5x5TURkfxq31eryiHe2IteRAEtoVzYg2_s9QhlH6ANVcFOVp8dMno0V9bfMYfeSQa3FkjEbxFsseHkMOiADmp9-tOGtLXO942Ir-2W_Hz3Utlpt4erz0dVJBw8a-mFavPA8EEDWR7ACJNocrVHFkS3wFISh3LqLn6KkXiowaynKlJOEHGctuahzKmF3ZOJ1BvGgKohxF9OXvQs9IdmCfWhYsLr5Q2p04TJJ-MyvTipuggKVioh8mHmOFdfnN-Zused6tXzhZtKPUWTmM8cBKoAOBHExxcMQ8SVSjxnw_7_eLKm7S2wNpu0V-tiPZPCH4wYZXtWBYjmfy0V9ydjXnNunXfgxKixLeFNnONUXxEuqPLvM_xAuonQBXVN4nYrgJv8p8U6_ZlGMPjJq1szfcuBZnzI34LSEWx_nSof0XC5Czm8iG_ihG8naivNWS8h-Q-qKMP_3PPFsLSH4Egh03pH93EJUuNAeSO4RGfUX1wzMvrv1nBC1SM660uFMbq-wkplFBbKnHKMYe-qRs1-lZPG5PwPWJJdpGqOUzbnoMOJYmiq06OHHVQyJSkcEHLCk"
}
Create a transaction record in the database.
For each transaction, a transaction.charge
event is generated automatically. In addition, each item in the products
array produces a product.buy
event.
All monetary values must use the same currency and be greater
than or equal to zero. discountAmount
must be greater than zero
or omitted.
API consumer who can use this method: Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_TRANSACTION_CREATE
Api-Version required | string Value: "4.4" |
required | object You must provide at least one of those profile identifiers. |
object or null How much the total cost decreased | |
object Any custom parameters | |
orderId required | string ID of the transaction.
If you want to be able to overwrite this transaction in the future, you use |
required | object Payment details |
required | Array of objects[ items ] A list of items in the transaction. Each item creates a
This means that when you update a transaction (a transaction can only be updated if it has an Example:
Additionally, because events can't be deleted from the database, cancelled items remain as events in a Profile's history. You can use a custom free-form property to tag items as cancelled. This way, you can keep cancelled items in |
recordedAt | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
required | object Transaction revenue (amount after taxation). This field is not calculated automatically by the backend, you must provide the value by summing up the results of |
required | object If you want to display the price before taxation, use this object. If you only want to display the price after taxation, set the values to the same as in |
source required | string Enum: "WEB_DESKTOP" "WEB_MOBILE" "MOBILE_APP" "POS" "MOBILE" "DESKTOP" Source of the event. |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
{- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "discountAmount": {
- "amount": 0,
- "currency": "USD"
}, - "metadata": { },
- "orderId": "be466362-71e9-4bdd-ad11-bfacead5276b",
- "paymentInfo": {
- "method": "CASH"
}, - "products": [
- {
- "finalUnitPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "name": "Soft drink",
- "sku": "189784563455",
- "categories": [
- "string"
], - "image": "string",
- "url": "string",
- "netUnitPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "tax": 0,
- "quantity": 2.5,
- "regularPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "discountPrice": {
- "amount": 15.5,
- "currency": "USD"
}, - "discountPercent": 0,
- "property1": null,
- "property2": null
}
], - "recordedAt": "2019-02-07T09:53:56.999+00:00",
- "revenue": {
- "amount": 64.25,
- "currency": "USD"
}, - "value": {
- "amount": 112.25,
- "currency": "USD"
}, - "source": "MOBILE",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00"
}
{- "timestamp": "2020-10-28T12:14:45.364+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "JSON parse error: Missing property: 'currency'; nested exception is com.fasterxml.jackson.databind.JsonMappingException: Missing property: 'currency'\n at [Source: (PushbackInputStream); line: 13, column: 14] (through reference chain: com.synerise.api.endpoint.transactions.domain.model.IdentifiedTransactionData[\"products\"]->java.util.ArrayList[0]->com.synerise.api.endpoint.transactions.domain.model.ProductData[\"finalUnitPrice\"])",
- "path": "/transactions"
}
Enqueue a number of add/update operations in the Synerise application database.
For each transaction, a transaction.charge
event is generated automatically. In addition, each item in the products
array produces a product.buy
event.
If you don't have some information about a transaction, don't insert a null-value parameter - omit the parameter entirely. Sending a null value deletes an attribute (if it's a custom attribute) or sets it to null/default value (if the attribute is Synerise-native).
The body contains an array of objects to update. The objects are the same as in the Update transaction and Create transaction endpoints.
All monetary values must use the same currency and be greater
than or equal to zero. discountAmount
must be greater than zero
or omitted.
API consumer who can use this method: Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BATCH_TRANSACTION_CREATE
Api-Version required | string Value: "4.4" |
An array of transactions to post or update
required | object You must provide at least one of those profile identifiers. |
object or null How much the total cost decreased | |
object Any custom parameters | |
orderId required | string ID of the transaction.
If you want to be able to overwrite this transaction in the future, you use |
required | object Payment details |
required | Array of objects[ items ] A list of items in the transaction. Each item creates a
This means that when you update a transaction (a transaction can only be updated if it has an Example:
Additionally, because events can't be deleted from the database, cancelled items remain as events in a Profile's history. You can use a custom free-form property to tag items as cancelled. This way, you can keep cancelled items in |
recordedAt | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
required | object Transaction revenue (amount after taxation). This field is not calculated automatically by the backend, you must provide the value by summing up the results of |
required | object If you want to display the price before taxation, use this object. If you only want to display the price after taxation, set the values to the same as in |
source required | string Enum: "WEB_DESKTOP" "WEB_MOBILE" "MOBILE_APP" "POS" "MOBILE" "DESKTOP" Source of the event. |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
[- {
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "discountAmount": {
- "amount": 0,
- "currency": "USD"
}, - "metadata": { },
- "orderId": "be466362-71e9-4bdd-ad11-bfacead5276b",
- "paymentInfo": {
- "method": "CASH"
}, - "products": [
- {
- "finalUnitPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "name": "Soft drink",
- "sku": "189784563455",
- "categories": [
- "string"
], - "image": "string",
- "url": "string",
- "netUnitPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "tax": 0,
- "quantity": 2.5,
- "regularPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "discountPrice": {
- "amount": 15.5,
- "currency": "USD"
}, - "discountPercent": 0,
- "property1": null,
- "property2": null
}
], - "recordedAt": "2019-02-07T09:53:56.999+00:00",
- "revenue": {
- "amount": 64.25,
- "currency": "USD"
}, - "value": {
- "amount": 112.25,
- "currency": "USD"
}, - "source": "MOBILE",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00"
}
]
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2020-10-28T12:24:24.444Z",
- "path": "/transactions",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 14191,
- "field": "client",
- "message": "Client cannot have null value"
}
]
}
This endpoint is deprecated. Use /activities-api/events/by/{identifierType} instead.
Retrieve a list of events saved in a Profile.
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_LISTING_BY_CLIENT_EVENTS_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
clientId required | integer <int64> Example: 434428563 The ID of the profile |
time[from] | string <date-time> Start of the time range to query. UTC time in ISO 8601 (for example, |
time[to] | string <date-time> End of the time range to query. UTC time in ISO 8601 (for example, |
action | string Example: action=transaction.charge Filter events by action type. For example, to retrieve completed transactions, enter |
limit | integer [ 1 .. 500 ] The number of events to retrieve |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request GET --url 'https://api.synerise.com/v4/events/by-client/%7BclientId%7D?time%5Bfrom%5D=SOME_STRING_VALUE&time%5Bto%5D=SOME_STRING_VALUE&action=transaction.charge&limit=SOME_INTEGER_VALUE' --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
[- {
- "time": "string",
- "action": "client.updateData",
- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "params": {
- "eventCreateTime": 1669228766.789,
- "ip": { },
- "property1": null,
- "property2": null
}
}
]
Send a 'client application started' event.
This endpoint is available from API version 4.1.2.
When you send an event to this endpoint, the action
field is set to client.applicationStarted
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_APPLICATION_STARTED_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
required | object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "applicationName": "string",
- "version": "string"
}
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'profile account registered' event.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to client.register
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_REGISTERED_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'profile logged in' event.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to client.login
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_LOGGED_IN_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'profile logged out' event.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to client.logout
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_LOGGED_OUT_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send an 'item added to cart' event.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to product.addToCart
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_ADDED_TO_CART_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
required | object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "sku": "189784563455",
- "name": "Soft drink",
- "category": "Beverages",
- "categories": [
- "string"
], - "offline": true,
- "source": "MOBILE",
- "regularUnitPrice": {
- "amount": 0,
- "currency": "USD"
}, - "discountedUnitPrice": {
- "amount": 0,
- "currency": "USD"
}, - "finalUnitPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "ItemUrlAddress": "string",
- "producer": "string",
- "quantity": 0
}
}
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2018-06-07T09:55:20.563Z",
- "message": "Some fields did not pass validation",
- "path": "/events/added-to-cart",
- "errors": [
- {
- "path": "label",
- "message": "cannot be empty",
- "rejectedValue": ""
}, - {
- "path": "label",
- "message": "length must be between 1 and 64",
- "rejectedValue": ""
}
]
}
Send an 'item removed from cart' event.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to product.removeFromCart
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_REMOVED_FROM_CART_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
required | object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "sku": "189784563455",
- "name": "Soft drink",
- "category": "Beverages",
- "categories": [
- "string"
], - "offline": true,
- "source": "MOBILE",
- "regularUnitPrice": {
- "amount": 0,
- "currency": "USD"
}, - "discountedUnitPrice": {
- "amount": 0,
- "currency": "USD"
}, - "finalUnitPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "ItemUrlAddress": "string",
- "producer": "string",
- "quantity": 0
}
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send an 'item added to favorites' event.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to product.addToFavorite
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_ADDED_TO_FAVORITES_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send an 'item viewed' event.
When you send an event to this endpoint, the action
field is set to product.view
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_PRODUCT_VIEW_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "productId": "189784563455",
- "name": "Soft drink",
- "fromRecommendation": true,
- "source": "MOBILE",
- "category": "Beverages",
- "url": "string",
- "campaignHash": "21e0d4b0-bd4e-497b-817b-4fr660284918"
}
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'profile assigned to company' event.
When you send an event to this endpoint, the action
field is set to client.assignToCompany
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User, Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_ASSIGNED_TO_COMPANY_EVENTS_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
required | object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "companyId": 0
}
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send an event when a profile submits its location.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to client.location
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_APPEARED_IN_LOCATION_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "lat": 50.021102,
- "lon": 19.886218
}
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Record a 'push notification was received' event. It is used for push message interaction tracking.
This endpoint is available from API version 4.1.2.
When you send an event to this endpoint, the action
field is set to push.receiveInBackground
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_PUSH_RECIVED_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Record a 'push notification was viewed' event. It is used for push message interaction tracking.
When you send an event to this endpoint, the action
field is set to push.view
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_PUSH_VIEWED_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'Push notification was clicked' event. It's used for push message interaction tracking.
When you send an event to this endpoint, the action
field is set to push.click
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_PUSH_CLICKED_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'push notifications cancelled' event. It's used for push message interaction tracking.
When you send an event to this endpoint, the action
field is set to push.cancel
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_PUSH_CANCELLED_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'transaction cancelled' event.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to transaction.cancel
by the backend.
API consumer who can use this method: Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_CANCELLED_TRANSACTION_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "orderId": "be466362-71e9-4bdd-ad11-bfacead5276b",
- "orderStatus": "string",
- "discountAmount": {
- "amount": 0,
- "currency": "USD"
}, - "discountPercent": 0,
- "discountCode": "string",
- "value": {
- "amount": 112.25,
- "currency": "USD"
}, - "revenue": {
- "amount": 64.25,
- "currency": "USD"
}, - "products": [
- {
- "finalUnitPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "name": "Soft drink",
- "sku": "189784563455",
- "categories": [
- "string"
], - "image": "string",
- "url": "string",
- "netUnitPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "tax": 0,
- "quantity": 2.5,
- "regularPrice": {
- "amount": 3.25,
- "currency": "USD"
}, - "discountPrice": {
- "amount": 15.5,
- "currency": "USD"
}, - "discountPercent": 0,
- "property1": null,
- "property2": null
}
], - "source": "MOBILE",
- "paymentInfo": {
- "method": "CASH"
}
}
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'timer' event.
Timers are used for analytics. For example, if you send a event when a profiles starts doing something and another one when they finish, you can collect data about average activity time.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to client.hitTimer
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_HIT_TIMER_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'search requested' event.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to client.search
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_SEARCHED_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
This endpoint is deprecated. Use the AI Events endpoints instead.
Send a 'recommendation was viewed' event.
When you send an event to this endpoint, the action
field is set to recommendation.view
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_RECOMENDATION_SEEN_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "productId": "189784563455",
- "name": "Soft drink",
- "source": "MOBILE",
- "campaignHash": "21e0d4b0-bd4e-497b-817b-4fr660284918",
- "url": "string",
- "category": "Beverages"
}
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'recommendation clicked' event. This endpoint is deprecated. Use the AI Events endpoints instead.
When you send an event to this endpoint, the action
field is set to recommendation.click
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_RECOMMENDATION_CLICK_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": {
- "productId": "189784563455",
- "name": "Soft drink",
- "source": "MOBILE",
- "campaignHash": "21e0d4b0-bd4e-497b-817b-4fr660284918",
- "url": "string",
- "category": "Beverages"
}
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a 'screen in a mobile app was visited' event. This can be used for mobile screen usage tracking.
If you don't have a value for a field, omit that field. Do not send null values.
When you send an event to this endpoint, the action
field is set to screen.view
by the backend.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_VISITED_SCREEN_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a custom event.
WARNING: This endpoint doesn't create product.buy
events from transaction.charge
events! Use Create a transaction or Batch add or update transactions instead.
If you don't have a value for a field, omit that field. Do not send null values.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_CUSTOM_EVENTS_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
Api-Version required | string Value: "4.4" |
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
action required | string For custom events, enter your own action name. For pre-defined events, omit this field. |
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "action": "context.action",
- "params": { }
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Send a batch of events as an array of objects. You can send up to a 1000 events and the size of the request can't be more than 1 MB.
WARNING: This endpoint doesn't create product.buy
events from transaction.charge
events! Use Create a transaction or Batch add or update transactions instead.
If you don't have a value for a field, omit that field. Do not send null values.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BATCH_EVENTS_CREATE
Api-Version required | string Value: "4.4" |
IMPORTANT: In a request, all events must use the same type of profile identifier. For example, if you want to send some events identified by email and others by customId, you must send them in separate batches.
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
type required | string The type of event. If custom event, use If other type, use the value that corresponds to the single event's endpoint.(for example, "content shared" events, which use the |
action required | string For custom events, enter your own action name. For pre-defined events, omit this field. |
object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. If you want to send a date/time param for use in analytics, take the following into account:
Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
[- {
- "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00",
- "type": "string",
- "action": "context.action",
- "params": { }
}
]
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Get current server time, needed to send events with a correct timestamp.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client)
This method does not require a Synerise authorization token.
Api-Version required | string Value: "4.4" |
curl --request GET --url https://api.synerise.com/v4/server/time --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "serverTime": "2019-08-24T14:15:22Z"
}
A recommendation was displayed to a customer.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_RECOMMENDATION_VIEW_EVENT_CREATE
Api-Version required | string Value: "4.4" |
required | object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
{- "params": {
- "items": [
- "string"
], - "correlationId": "string",
- "campaignId": "string"
}, - "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00"
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
An item in a search result was clicked or tapped.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_ITEM_SEARCH_CLICK_EVENT_CREATE
Api-Version required | string Value: "4.4" |
required | object Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Aside from the required parameters (if any exist), all events accept custom, free-form parameters, with the following restrictions: WARNING:
|
label required | string non-empty This parameter is required, but not saved in the database. It can't be used in Analytics, Automations, and so on. |
required | object You must provide at least one of those profile identifiers. |
time | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
eventSalt | string When an event has an
To overwrite an event with another one, the new event MUST:
IMPORTANT:
|
{- "params": {
- "item": "string",
- "correlationId": "string",
- "position": 0,
- "searchType": "full-text-search"
}, - "label": "Human-readable label",
- "client": {
- "customId": "string",
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "email": "string"
}, - "time": "2019-02-07T09:53:56.999+00:00",
- "eventSalt": "972346context.action2019-02-07T09:53:56.999+00:00"
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Upload a batch of events to the AI engine. A request can only include events of one type.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BATCH_EVENTS_CREATE
eventType | string Enum: "item.search.click" "product.search.click" "recommendation.click" "recommendation.view" A request can only include events of the same type. |
Array of item.search.click (object) or recommendation.view (object) or recommendation.click (object) or product.search.click (object)[ items ] An array of events |
{- "eventType": "item.search.click",
- "items": [
- {
- "correlationId": "string",
- "clientUUID": "07243772-008a-42e1-ba37-c3807cebde8f",
- "position": 0,
- "searchType": "full-text-search",
- "item": "string",
- "EventTimestamp": "2019-02-07T09:53:56.999+00:00",
- "property1": null,
- "property2": null
}
]
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Upload an item.search.click event to the AI engine.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_ITEM_SEARCH_CLICK_EVENT_CREATE
correlationId required | string
|
clientUUID required | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
position required | integer Position of the clicked item in the result list (count starts with 1) |
searchType required | string Enum: "full-text-search" "autocomplete" Type of the search |
item required | string itemId (also called |
EventTimestamp | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
property name* | any Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "correlationId": "string",
- "clientUUID": "07243772-008a-42e1-ba37-c3807cebde8f",
- "position": 0,
- "searchType": "full-text-search",
- "item": "string",
- "EventTimestamp": "2019-02-07T09:53:56.999+00:00",
- "property1": null,
- "property2": null
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Upload a product.search.click event to the AI engine.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_PRODUCT_SEARCH_CLICK_EVENT_CREATE
correlationId required | string
|
clientUUID required | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
position required | integer Position of the clicked item in the result list (count starts with 1) |
searchType required | string Enum: "full-text-search" "autocomplete" Type of the search |
productId required | string itemId (also called |
EventTimestamp | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
property name* | any Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "correlationId": "string",
- "clientUUID": "07243772-008a-42e1-ba37-c3807cebde8f",
- "position": 0,
- "searchType": "full-text-search",
- "productId": "string",
- "EventTimestamp": "2019-02-07T09:53:56.999+00:00",
- "property1": null,
- "property2": null
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Upload a recommendation.click event to the AI engine.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_RECOMMENDATION_CLICK_EVENT_CREATE
correlationId required | string
|
clientUUID required | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
item required | string itemId (also called |
campaignId | string ID of the campaign related to the event |
sessionId | string ID of the user session |
EventTimestamp | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
property name* | any Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "correlationId": "string",
- "clientUUID": "07243772-008a-42e1-ba37-c3807cebde8f",
- "item": "string",
- "campaignId": "string",
- "sessionId": "string",
- "EventTimestamp": "2019-02-07T09:53:56.999+00:00",
- "property1": null,
- "property2": null
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
Upload a recommendation.view event to the AI engine.
API consumers who can use this method: Workspace (formerly Business Profile), Profile (formerly client), Anonymous profile (formerly client), Web SDK tracker, AI API key (legacy)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_RECOMMENDATION_VIEW_EVENT_CREATE
correlationId required | string
|
clientUUID required | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
items required | Array of strings >= 0 items An array of items included in the recommendation. The items are identified by their |
EventTimestamp | string Time when the event occurred, in ISO 8601. This time isn't affected and doesn't affect the timezone of your workspace - you can send events with a timezone different than that of the workspace. Synerise calculates the times into UTC standard when saving events in the database. If not defined, the backend inserts the time of receiving the event. A time with a "Z" at the end (for example, If you want to send time in a different timezone, you can do this by appending Note that if the timezone is ahead (+) of UTC, the UTC time is calculated by subtraction. When the timezone is behind (-) UTC, the UTC time is calculated by addition.
IMPORTANT: If you send an event with a future time, the parameter is rejected and the time of receiving the event is saved as the occurrence time. For example, if your timezone is UTC+1 and you send the event at 15:00 local time, future times are:
When you retrieve an event, its time is always shown as UTC. The original time string that you sent (even if it was a future time and was rejected) can be retrieved with the activities endpoints, as |
campaignId | string ID of the campaign related to the event |
property name* | any Additional parameters. Remember that you can use event enrichment to add the data automatically from a catalog. Events accept custom, free-form parameters, with the following restrictions: WARNING:
|
{- "correlationId": "string",
- "clientUUID": "07243772-008a-42e1-ba37-c3807cebde8f",
- "items": [
- "string"
], - "EventTimestamp": "2019-02-07T09:53:56.999+00:00",
- "campaignId": "string",
- "property1": null,
- "property2": null
}
{- "timestamp": "2018-06-07T07:28:26.078+00:00",
- "status": 400,
- "error": "Bad Request",
- "message": "Version header content is invalid",
- "path": "/path_of_the_endpoint"
}
As a profile, retrieve a list of your own events.
API consumer who can use this method: Profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
actions | string Example: actions=page.visit A comma-separated list of actions (or a single action) that will be included in the response |
dateFrom | number Lower value of the time range, as a Unix timestamp in milliseconds. |
dateTo | number Upper limit of the time range to fetch, as a Unix timestamp in milliseconds. |
limit | number [ 1 .. 1000 ] The maximum number of events to retrieve |
raw | boolean Default: false When |
pageToken | string The token of the page to retrieve. You can check the tokens of the next/previous page in the response to this endpoint. If not provided, the first page is retrieved. |
sortBy | string Default: "time:desc" Enum: "time:desc" "time:asc" Sorting order. |
curl --request GET --url 'https://api.synerise.com/activities-api/events?actions=SOME_STRING_VALUE&dateFrom=SOME_NUMBER_VALUE&dateTo=SOME_NUMBER_VALUE&limit=SOME_NUMBER_VALUE&raw=SOME_BOOLEAN_VALUE&pageToken=SOME_STRING_VALUE&sortBy=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "meta": {
- "links": [
- {
- "url": "string",
- "rel": "first"
}
], - "cursors": {
- "after": "string",
- "before": "string"
}, - "limit": 0,
- "count": 0
}, - "data": [
- {
- "action": {
- "name": "page.visit",
- "label": "string",
- "description": "string"
}, - "description": "string",
- "eventUUID": "482af443-7f6f-4b80-b4ac-a7db5a2f543a",
- "unique": 1245924049,
- "icon": "string",
- "time": 1667563770404,
- "label": "string",
- "client": {
- "uuid": "string",
- "id": 0,
- "firstname": "string",
- "lastname": "string",
- "email": "string",
- "avatarUrl": "string"
}, - "userAgent": {
- "system": "string",
- "browser": "string"
}, - "modifiedBy": "string"
}
]
}
Retrieve the details of a single activity.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
identifierType required | string Enum: "id" "uuid" "email" "custom_identify" Profile identifier type |
identifierValue required | string Value of the selected profile identifier |
required | Event storage data request (object) or Raw data request (if not available, data from event storage is returned) (object) Identification of the event to retrieve |
{- "identifierValue": "string",
- "additionalData": {
- "time": "1667563770404",
- "unique": "1245924049"
}
}
{- "action": "page.visit",
- "eventUUID": "482af443-7f6f-4b80-b4ac-a7db5a2f543a",
- "unique": 1245924049,
- "createDate": 1667563770404,
- "label": "string",
- "params": {
- "eventCreateTime": 1667563770.404,
- "ip": "string",
- "property1": null,
- "property2": null
}
}
Modify an existing icon mapping
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
iconID required | number ID of the icon |
Updated mapping data
action | string Action name. Can be up to 32 characters long and must match the following regular expression: |
icon | string URL of the icon |
{- "action": "page.visit",
- "icon": "string"
}
[- {
- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "icon": "string"
}
]
Retrieve a list of existing event-icon mappings
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
curl --request GET --url https://api.synerise.com/activities-api/icons --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "icon": "string"
}
]
For each event, you can add a custom icon that's displayed in the Synerise Web Application
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
Icon details
action | string Action name. Can be up to 32 characters long and must match the following regular expression: |
icon | string URL of the icon |
{- "action": "page.visit",
- "icon": "string"
}
{- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "icon": "string"
}
Retrieve a list of events for the single profile.
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
identifierType required | string Enum: "id" "uuid" "email" "custom_identify" Profile identifier type |
pageToken | string The token of the page to retrieve. You can check the tokens of the next/previous page in the response to this endpoint. If not provided, the first page is retrieved. |
identifierValue required | string Value of the identifier selected in |
required | object Pagination, date filters, and other optional parameters |
{- "identifierValue": "string",
- "additionalData": {
- "actions": "page.visit,client.login",
- "dateFrom": "1720688755000",
- "dateTo": "1720695955000",
- "limit": "50",
- "raw": "true",
- "pageToken": "string",
- "sortBy": "time:desc"
}
}
{- "meta": {
- "links": [
- {
- "url": "string",
- "rel": "first"
}
], - "cursors": {
- "after": "string",
- "before": "string"
}, - "limit": 0,
- "count": 0
}, - "data": [
- {
- "action": {
- "name": "page.visit",
- "label": "string",
- "description": "string"
}, - "description": "string",
- "eventUUID": "482af443-7f6f-4b80-b4ac-a7db5a2f543a",
- "unique": 1245924049,
- "icon": "string",
- "time": 1667563770404,
- "label": "string",
- "client": {
- "uuid": "string",
- "id": 0,
- "firstname": "string",
- "lastname": "string",
- "email": "string",
- "avatarUrl": "string"
}, - "userAgent": {
- "system": "string",
- "browser": "string"
}, - "modifiedBy": "string"
}
]
}
Retrieve a list of activities from a single profile.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
clientId required | number Example: 434428563 The ID of the profile |
dateFrom | number Lower value of the time range, as a Unix timestamp in milliseconds. Defaults to current time minus 2 hours. |
dateTo | number Upper limit of the time range to fetch, as a Unix timestamp in milliseconds. Defaults to current time. |
actions | string Example: actions=page.visit A comma-separated list of actions (or a single action) that will be included in the response |
limit | number [ 1 .. 1000 ] The maximum number of events to retrieve |
raw | boolean Default: false When |
format | string Default: "json" Enum: "json" "csv" The format of the retrieved data |
curl --request GET --url 'https://api.synerise.com/activities-api/activities/%7BclientId%7D?dateFrom=SOME_NUMBER_VALUE&dateTo=SOME_NUMBER_VALUE&actions=SOME_STRING_VALUE&limit=SOME_NUMBER_VALUE&raw=SOME_BOOLEAN_VALUE&format=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "action": {
- "name": "page.visit",
- "label": "string",
- "description": "string"
}, - "description": "string",
- "eventUUID": "482af443-7f6f-4b80-b4ac-a7db5a2f543a",
- "unique": 1245924049,
- "icon": "string",
- "time": 1667563770404,
- "label": "string",
- "client": {
- "uuid": "string",
- "id": 0,
- "firstname": "string",
- "lastname": "string",
- "email": "string",
- "avatarUrl": "string"
}, - "userAgent": {
- "system": "string",
- "browser": "string"
}, - "modifiedBy": "string"
}
]
Retrieve a list of activities from the workspace.
Only data from the last 6 hours is available, even if the dateFrom
parameter points to further in the past.
If you want to retrieve the activities of a single profile, use the Get profile activities method.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
dateFrom | number Lower value of the time range, as a Unix timestamp in milliseconds. Defaults to current time minus 2 hours. |
dateTo | number Upper limit of the time range to fetch, as a Unix timestamp in milliseconds. Defaults to current time. |
limit | number [ 1 .. 1000 ] The maximum number of events to retrieve |
raw | boolean Default: false When |
format | string Default: "json" Enum: "json" "csv" The format of the retrieved data |
curl --request GET --url 'https://api.synerise.com/activities-api/activities?dateFrom=SOME_NUMBER_VALUE&dateTo=SOME_NUMBER_VALUE&limit=SOME_NUMBER_VALUE&raw=SOME_BOOLEAN_VALUE&format=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "action": {
- "name": "page.visit",
- "label": "string",
- "description": "string"
}, - "description": "string",
- "eventUUID": "482af443-7f6f-4b80-b4ac-a7db5a2f543a",
- "unique": 1245924049,
- "icon": "string",
- "time": 1667563770404,
- "label": "string",
- "client": {
- "uuid": "string",
- "id": 0,
- "firstname": "string",
- "lastname": "string",
- "email": "string",
- "avatarUrl": "string"
}, - "userAgent": {
- "system": "string",
- "browser": "string"
}, - "modifiedBy": "string"
}
]
Modify an existing label mapping
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
labelId required | number ID of the mapping |
Updated information
action | string Action name. Can be up to 32 characters long and must match the following regular expression: |
label | string Event name shown in a Profile card. Can include jinja inserts, which are returned unprocessed. This description is not used when searching for events in Analytics or for Automation trigger purposes. |
{- "action": "page.visit",
- "label": "string"
}
{- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "label": "string"
}
Retrieve a list of existing event-label mappings
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
curl --request GET --url https://api.synerise.com/activities-api/labels --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "label": "string"
}
]
For each event, you can add a custom, human-readable label that's displayed in the Synerise Web Application
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
Details of the label mapping
action | string Action name. Can be up to 32 characters long and must match the following regular expression: |
label | string Event name shown in a Profile card. Can include jinja inserts, which are returned unprocessed. This description is not used when searching for events in Analytics or for Automation trigger purposes. |
{- "action": "page.visit",
- "label": "string"
}
{- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "label": "string"
}
Retrieve a list of existing event-description mappings
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
curl --request GET --url https://api.synerise.com/activities-api/descriptions --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "description": "string"
}
]
For each event, you can add a custom, human-readable description that's displayed in the Synerise Web Application
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
Details of the description mapping
action | string Action name. Can be up to 32 characters long and must match the following regular expression: |
description | string Event description shown in a Profile card. Can include jinja inserts, which are returned unprocessed. This description is not used when searching for events in Analytics or for Automation trigger purposes. |
{- "action": "page.visit",
- "description": "string"
}
{- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "description": "string"
}
Modify an existing description mapping
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ACTIVITIES_API_ACTIVITIES_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_ACTIVITIES
descriptionId required | number ID of the mapping |
Updated information
action | string Action name. Can be up to 32 characters long and must match the following regular expression: |
description | string Event description shown in a Profile card. Can include jinja inserts, which are returned unprocessed. This description is not used when searching for events in Analytics or for Automation trigger purposes. |
{- "action": "page.visit",
- "description": "string"
}
{- "id": 0,
- "businessProfileId": 0,
- "action": "page.visit",
- "description": "string"
}
Retrieve a paginated list of schemas from the current Workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_SCHEMA_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
limit required | number Number of entries per page |
page required | number Selected page. The first page has the index |
name | string Searches for a given string in schema names. The search is not case-sensitive. |
curl --request GET --url 'https://api.synerise.com/boxes-v2/schemas?limit=SOME_NUMBER_VALUE&page=SOME_NUMBER_VALUE&name=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- {
- "businessProfileId": 48,
- "primaryKey": {
- "type": "auto_pk"
}, - "schemaName": "firstSchema",
- "schemaId": "86403a7d-1120-491a-a789-3d328d91193d",
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}, - "property2": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}
}, - "layout": [
- {
- "type": "SINGLE",
- "fieldName": "string"
}
], - "relations": {
- "property1": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}, - "property2": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}
}, - "tags": [
- "string"
], - "permissionStatus": "private"
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Create a new schema.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_SCHEMA_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
Structure of the schema
schemaName required | string Name of the schema |
any | |
required | object The fields define the data that can be entered into a record. |
required | Array of Input field (object) or Columns layout (object) or Table layout (object) (Layout) [ items ] The graphical layout of the schema. The layouts are displayed according to their order in the array. |
tags | Array of strings Tags assigned to the schema |
{- "schemaName": "firstSchema",
- "primaryKey": {
- "type": "auto_pk"
}, - "fields": {
- "property1": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}, - "property2": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}
}, - "layout": [
- {
- "type": "SINGLE",
- "fieldName": "string"
}
], - "tags": [
- "string"
]
}
{- "businessProfileId": 48,
- "primaryKey": {
- "type": "auto_pk"
}, - "schemaName": "firstSchema",
- "schemaId": "86403a7d-1120-491a-a789-3d328d91193d",
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}, - "property2": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}
}, - "layout": [
- {
- "type": "SINGLE",
- "fieldName": "string"
}
], - "relations": {
- "property1": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}, - "property2": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}
}, - "tags": [
- "string"
], - "permissionStatus": "private"
}
Retrieve the details of a single schema.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_SCHEMA_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
curl --request GET --url https://api.synerise.com/boxes-v2/schemas/%7BschemaId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "businessProfileId": 48,
- "primaryKey": {
- "type": "auto_pk"
}, - "schemaName": "firstSchema",
- "schemaId": "86403a7d-1120-491a-a789-3d328d91193d",
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}, - "property2": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}
}, - "layout": [
- {
- "type": "SINGLE",
- "fieldName": "string"
}
], - "relations": {
- "property1": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}, - "property2": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}
}, - "tags": [
- "string"
], - "permissionStatus": "private"
}
Update an existing schema.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_SCHEMA_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
Structure of the schema
schemaName required | string Name of the schema |
any | |
required | object The fields define the data that can be entered into a record. |
required | Array of Input field (object) or Columns layout (object) or Table layout (object) (Layout) [ items ] The graphical layout of the schema. The layouts are displayed according to their order in the array. |
tags | Array of strings Tags assigned to the schema |
{- "schemaName": "firstSchema",
- "primaryKey": {
- "type": "auto_pk"
}, - "fields": {
- "property1": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}, - "property2": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}
}, - "layout": [
- {
- "type": "SINGLE",
- "fieldName": "string"
}
], - "tags": [
- "string"
]
}
{- "businessProfileId": 48,
- "primaryKey": {
- "type": "auto_pk"
}, - "schemaName": "firstSchema",
- "schemaId": "86403a7d-1120-491a-a789-3d328d91193d",
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}, - "property2": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}
}, - "layout": [
- {
- "type": "SINGLE",
- "fieldName": "string"
}
], - "relations": {
- "property1": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}, - "property2": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}
}, - "tags": [
- "string"
], - "permissionStatus": "private"
}
Delete a schema. This operation is irreversible.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_SCHEMA_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
curl --request DELETE --url https://api.synerise.com/boxes-v2/schemas/%7BschemaId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
Retrieve a paginated list of schema projections (simplified data of schemas) from the current Workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_SCHEMA_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
limit required | number Number of entries per page |
page required | number Selected page. The first page has the index |
name | string Searches for a given string in schema names. The search is not case-sensitive. |
curl --request GET --url 'https://api.synerise.com/boxes-v2/schemas/projections?limit=SOME_NUMBER_VALUE&page=SOME_NUMBER_VALUE&name=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- {
- "schemaId": "4da878bc-ed5d-4d32-b31c-b6f7cc68936f",
- "schemaName": "schema1"
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Retrieve a paginated list of predefined schemas.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_PREDEFINED_SCHEMA_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
limit required | number Number of entries per page |
page required | number Selected page. The first page has the index |
curl --request GET --url 'https://api.synerise.com/boxes-v2/predefined-schemas?limit=SOME_NUMBER_VALUE&page=SOME_NUMBER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- {
- "businessProfileId": 48,
- "primaryKey": {
- "type": "auto_pk"
}, - "schemaName": "firstSchema",
- "schemaId": "86403a7d-1120-491a-a789-3d328d91193d",
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}, - "property2": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}
}, - "layout": [
- {
- "type": "SINGLE",
- "fieldName": "string"
}
], - "relations": {
- "property1": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}, - "property2": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}
}, - "tags": [
- "string"
], - "permissionStatus": "private"
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Retrieve the details of a single predefined schema.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_PREDEFINED_SCHEMA_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
curl --request GET --url https://api.synerise.com/boxes-v2/predefined-schemas/%7BschemaId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "businessProfileId": 48,
- "primaryKey": {
- "type": "auto_pk"
}, - "schemaName": "firstSchema",
- "schemaId": "86403a7d-1120-491a-a789-3d328d91193d",
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}, - "property2": {
- "type": "TEXT",
- "design": {
- "label": "string",
- "hideLabel": true,
- "placeholder": "string",
- "description": "string",
- "tooltip": "string",
- "tabIndex": 0,
- "initialFocus": true
}, - "validation": {
- "required": true,
- "unique": true,
- "minimumLength": 0,
- "maximumLength": 0,
- "regexPattern": "string",
- "errorMessage": "string"
}, - "layout": {
- "marginTop": "15px",
- "marginRight": "1cm",
- "marginBottom": "12pt",
- "marginLeft": "1.0em"
}
}
}, - "layout": [
- {
- "type": "SINGLE",
- "fieldName": "string"
}
], - "relations": {
- "property1": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}, - "property2": {
- "type": "one",
- "schemaId": "0790bd7c-8c2b-4e31-b01a-eee434331800",
- "constraints": [
- {
- "type": "equal",
- "schemaFieldName": "string",
- "relatedSchemaFieldName": "string"
}
]
}
}, - "tags": [
- "string"
], - "permissionStatus": "private"
}
Retrieve all records from the schema.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_RECORD_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
limit required | number Number of entries per page |
page required | number Selected page. The first page has the index |
curl --request GET --url 'https://api.synerise.com/boxes-v2/records/%7BschemaId%7D?limit=SOME_NUMBER_VALUE&page=SOME_NUMBER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- {
- "schemaId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "recordId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "businessProfileId": 48,
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "amount": 112.25,
- "currency": "USD"
}, - "property2": {
- "amount": 112.25,
- "currency": "USD"
}
}, - "relations": {
- "property1": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}, - "property2": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}
}, - "permissionStatus": "private"
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Create a new record. A record creates a database entry according to a schema.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_RECORD_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
The record to create
required | object Fields and their values. Each field is an array of value objects (even if the field type requires only a single value). |
{- "fields": {
- "property1": {
- "amount": 112.25,
- "currency": "USD"
}, - "property2": {
- "amount": 112.25,
- "currency": "USD"
}
}
}
{- "schemaId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "recordId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "businessProfileId": 48,
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "amount": 112.25,
- "currency": "USD"
}, - "property2": {
- "amount": 112.25,
- "currency": "USD"
}
}, - "relations": {
- "property1": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}, - "property2": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}
}, - "permissionStatus": "private"
}
Retrieve the details of a single record.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_RECORD_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
recordId required | string <uuid> UUID of the record |
curl --request GET --url https://api.synerise.com/boxes-v2/records/%7BschemaId%7D/%7BrecordId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "schemaId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "recordId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "businessProfileId": 48,
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "amount": 112.25,
- "currency": "USD"
}, - "property2": {
- "amount": 112.25,
- "currency": "USD"
}
}, - "relations": {
- "property1": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}, - "property2": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}
}, - "permissionStatus": "private"
}
Update a record.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_RECORD_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
recordId required | string <uuid> UUID of the record |
Record to update
required | object Fields and their values. Each field is an array of value objects (even if the field type requires only a single value). |
{- "fields": {
- "property1": {
- "amount": 112.25,
- "currency": "USD"
}, - "property2": {
- "amount": 112.25,
- "currency": "USD"
}
}
}
{- "schemaId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "recordId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "businessProfileId": 48,
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "amount": 112.25,
- "currency": "USD"
}, - "property2": {
- "amount": 112.25,
- "currency": "USD"
}
}, - "relations": {
- "property1": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}, - "property2": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}
}, - "permissionStatus": "private"
}
Delete a record. This operation is irreversible.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_RECORD_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
recordId required | string <uuid> UUID of the record |
curl --request DELETE --url https://api.synerise.com/boxes-v2/records/%7BschemaId%7D/%7BrecordId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
Relative update allows you to easily change the value in a record without updating the entire record. Currently, only numeric values can be changed.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_RECORD_RELATIVE_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
recordId required | string <uuid> UUID of the record |
Record to be updated
required | object |
{- "actions": {
- "property1": {
- "changeBy": 0
}, - "property2": {
- "changeBy": 0
}
}
}
{- "schemaId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "recordId": "10c681d9-5afc-4ea1-ac97-dd1d22c7b045",
- "businessProfileId": 48,
- "createdAt": "2020-07-07T09:03:13.390101Z",
- "createdBy": 1234,
- "modifiedAt": "2020-07-07T09:03:13.390101Z",
- "modifiedBy": 1234,
- "deletedAt": "2020-07-07T09:03:13.390101Z",
- "deletedBy": 1234,
- "fields": {
- "property1": {
- "amount": 112.25,
- "currency": "USD"
}, - "property2": {
- "amount": 112.25,
- "currency": "USD"
}
}, - "relations": {
- "property1": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}, - "property2": {
- "type": "one",
- "recordId": "0790bd7c-8c2b-4e31-b01a-eee434331800"
}
}, - "permissionStatus": "private"
}
Get a list of paths to schemas documentations.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_DOCUMENTATION_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
limit required | number Number of entries per page |
page required | number Selected page. The first page has the index |
curl --request GET --url 'https://api.synerise.com/boxes-v2/documentation?limit=SOME_NUMBER_VALUE&page=SOME_NUMBER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- "string"
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Retrieve an OpenAPIv3 file with documentation for a single schema.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: BOXES_DOCUMENTATION_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_SCHEMA_BUILDER
schemaId required | string UUID of the schema |
curl --request GET --url https://api.synerise.com/boxes-v2/documentation/%7BschemaId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
delimiter | string The delimiter to use in csv. You can use |
curl --request GET --url 'https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/csv?delimiter=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "status": 0,
- "error": "string",
- "message": "string",
- "timestamp": "string"
}
Upload items to a catalog from a CSV file
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
itemKey required | string The name of the CSV column that contains unique identifiers |
file required | string <binary> CSV file |
curl --request POST --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/items/upload --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'content-type: multipart/form-data'
true
Retrieve all catalogs from the Workspace. You can filter and sort the results.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
searchBy | string A search string. You can search the catalogs by their name or the first or last name of the author. |
orderBy | string Enum: "id" "author" "lastModified" "creationDate" The parameter to order the results by. Order is always ascending. |
offset | integer The offset for the search. For example, if your |
limit | integer The maximum number of items to include in the response. |
curl --request GET --url 'https://api.synerise.com/catalogs/bags?searchBy=SOME_STRING_VALUE&orderBy=SOME_STRING_VALUE&offset=SOME_INTEGER_VALUE&limit=SOME_INTEGER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- {
- "id": 0,
- "name": "string",
- "businessProfileId": 0,
- "author": "string",
- "lastModified": "2019-08-24T14:15:22Z",
- "creationDate": "2019-08-24T14:15:22Z"
}
], - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Create a new, empty catalog.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
name | string Catalog name. |
{- "name": "string"
}
{- "data": {
- "id": 0,
- "name": "string",
- "businessProfileId": 0,
- "author": "string",
- "lastModified": "2019-08-24T14:15:22Z",
- "creationDate": "2019-08-24T14:15:22Z"
}, - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
Catalog ID
[- 1199,
- 1200,
- 1201
]
{- "data": [
- {
- "id": 0,
- "result": true
}
], - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Retrieve the list of keys from a catalog.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
curl --request GET --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/keys --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- "id",
- "isbn",
- "name"
], - "metaData": {
- "totalCount": 3,
- "requestTime": "0.071 [s]"
}
}
Retrieve the metadata of a catalog
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
curl --request GET --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": {
- "id": 0,
- "name": "string",
- "businessProfileId": 0,
- "author": "string",
- "lastModified": "2019-08-24T14:15:22Z",
- "creationDate": "2019-08-24T14:15:22Z"
}, - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Delete a single catalog. This operation is irreversible.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
curl --request DELETE --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": true,
- "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Retrieve the entries from a single catalog.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
itemKey | string Filter by the value of the unique identifier of the item (exact match) |
searchBy | string A search string. The search takes all key values into account. |
offset | integer The offset for the search. For example, if your |
limit | integer The maximum number of items to include in the response. |
curl --request GET --url 'https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/items?itemKey=SOME_STRING_VALUE&searchBy=SOME_STRING_VALUE&offset=SOME_INTEGER_VALUE&limit=SOME_INTEGER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- {
- "bag": {
- "id": 0,
- "name": "string",
- "businessProfileId": 0,
- "author": "string",
- "lastModified": "2019-08-24T14:15:22Z",
- "creationDate": "2019-08-24T14:15:22Z"
}, - "itemKey": "string",
- "id": 0,
- "value": "{\"Name\":\"John\",\"Surname\":\"Doe\"}",
- "creationDate": "string"
}
], - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Add a single item to the catalog.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_ITEM_BATCH_CATALOG_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
JSON object with any number of key/value pairs
itemKey required | string The value of the unique key of the item. IMPORTANT: This value is not visible in the Synerise Portal. If you want it to be visible in the Catalogs UI, you must add it again as a parameter in the |
required | object Properties of the item. Can be an empty object. |
{- "itemKey": "1357",
- "value": {
- "itemCategory": "smartphone",
- "itemColor": "blue",
- "itemVersion": "4"
}
}
true
Add a number of items at once.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_ITEM_BATCH_CATALOG_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
JSON object with any number of key/value pairs
itemKey required | string The value of the unique key of the item. IMPORTANT: This value is not visible in the Synerise Portal. If you want it to be visible in the Catalogs UI, you must add it again as a parameter in the |
required | object Properties of the item. Can be an empty object. |
[- {
- "itemKey": "1357",
- "value": {
- "itemCategory": "smartphone",
- "itemColor": "blue",
- "itemVersion": "4"
}
}
]
true
Change enrichment fields for given mapping
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_MAPPING_CATALOG_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
action | string |
paramKey | string |
enrichmentFields | Array of strings |
{- "action": "string",
- "paramKey": "string",
- "enrichmentFields": [
- "string"
]
}
0
Enable filtering for a catalog on selected fields
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
fields | Array of strings |
{- "fields": [
- "string"
]
}
0
Disable filtering for a catalog on selected fields
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
curl --request PATCH --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/disable/filtering --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
0
Retrieve a single item from a catalog by using the item key (unique identifier of an item in the catalog, for example a product's SKU) of the entry in the Synerise database.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
itemKey required | string
|
curl --request GET --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/items/itemKey/%7BitemKey%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": {
- "bag": {
- "id": 0,
- "name": "string",
- "businessProfileId": 0,
- "author": "string",
- "lastModified": "2019-08-24T14:15:22Z",
- "creationDate": "2019-08-24T14:15:22Z"
}, - "itemKey": "string",
- "id": 0,
- "value": "{\"Name\":\"John\",\"Surname\":\"Doe\"}",
- "creationDate": "string"
}, - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Delete a single item by itemKey (unique identifier of an item in the catalog, for example a product's SKU).
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
itemKey required | string
|
curl --request DELETE --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/items/itemKey/%7BitemKey%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": true,
- "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Retrieve a single item from a catalog by using the ID of the entry in the Synerise database. If you want retrieve an item by its unique identifier in the catalog, use this endpoint.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
itemId required | integer ID of the item. This is the ID of the entry in the Synerise
database, not the unique identifier that you're using in your
catalog. The itemId is available in the
|
curl --request GET --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/items/%7BitemId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": {
- "bag": {
- "id": 0,
- "name": "string",
- "businessProfileId": 0,
- "author": "string",
- "lastModified": "2019-08-24T14:15:22Z",
- "creationDate": "2019-08-24T14:15:22Z"
}, - "itemKey": "string",
- "id": 0,
- "value": "{\"Name\":\"John\",\"Surname\":\"Doe\"}",
- "creationDate": "string"
}, - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Update a single item from a catalog by using the ID of the entry in the Synerise database.
When updating, send all properties of the item, even if you're not changing them. If you omit an existing property, it is removed from the item entirely.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
itemId required | integer ID of the item. This is the ID of the entry in the Synerise
database, not the unique identifier that you're using in your
catalog. The itemId is available in the
|
JSON object with any number of key/value pairs
property name* | any The properties of the catalog item |
{- "property1": null,
- "property2": null
}
{- "data": {
- "bag": {
- "id": 0,
- "name": "string",
- "businessProfileId": 0,
- "author": "string",
- "lastModified": "2019-08-24T14:15:22Z",
- "creationDate": "2019-08-24T14:15:22Z"
}, - "itemKey": "string",
- "id": 0,
- "value": "{\"Name\":\"John\",\"Surname\":\"Doe\"}",
- "creationDate": "string"
}, - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Delete a single item by ID.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
itemId required | integer ID of the item. This is the ID of the entry in the Synerise
database, not the unique identifier that you're using in your
catalog. The itemId is available in the
|
curl --request DELETE --url https://api.synerise.com/catalogs/bags/%7BcatalogId%7D/items/%7BitemId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": true,
- "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Retrieve all items from all catalogs in the Workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
offset | integer The offset for the search. For example, if your |
limit | integer The maximum number of items to include in the response. |
curl --request GET --url 'https://api.synerise.com/catalogs/items?offset=SOME_INTEGER_VALUE&limit=SOME_INTEGER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- {
- "bag": {
- "id": 0,
- "name": "string",
- "businessProfileId": 0,
- "author": "string",
- "lastModified": "2019-08-24T14:15:22Z",
- "creationDate": "2019-08-24T14:15:22Z"
}, - "itemKey": "string",
- "id": 0,
- "value": "{\"Name\":\"John\",\"Surname\":\"Doe\"}",
- "creationDate": "string"
}
], - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Add a new mapping. Mappings can be used to enrich events with data from catalogs.
For example, you can map the product's SKU from the "product.buy" event to the column in the catalog that includes the SKU. Whenever someone purchases an item with that SKU, you can extract data from the catalog (for example, the product's brand and category) and show that additional in the event log in the Synerise GUI.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_MAPPING_CATALOG_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogId required | integer ID of the catalog |
action | string The |
paramKey | string The parameter in the event that corresponds to the catalog column with the unique identifiers |
{- "action": "transaction.charge",
- "paramKey": "sku"
}
{- "data": {
- "bpActionParamKey": "string",
- "bagId": 0,
- "businessProfileId": 0,
- "action": "transaction.charge",
- "paramKey": "sku"
}, - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Retrieve all mappings from the Workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_MAPPING_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
curl --request GET --url https://api.synerise.com/catalogs/mappings --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": [
- {
- "bpActionParamKey": "string",
- "bagId": 0,
- "businessProfileId": 0,
- "action": "transaction.charge",
- "paramKey": "sku"
}
], - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Delete a single mapping.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CATALOGS_MAPPING_CATALOG_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
bpActionParamKey required | string The unique identifier of the mapping |
curl --request DELETE --url https://api.synerise.com/catalogs/mappings/%7BbpActionParamKey%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": true,
- "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Retrieve a single item from a catalog by using the value of the unique identifier (key) in the catalog. If you want retrieve an item by its ID in the Synerise database, use this endpoint.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ITEMS_COLLECTOR_CATALOG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_CATALOGS
catalogName required | string Name of the catalog |
key required | string Value of the unique identifier of the item in the catalog. When you retrieve an item using this endpoint, the identifier is in the
|
curl --request GET --url 'https://api.synerise.com/catalogs/itemDetail?catalogName=SOME_STRING_VALUE&key=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "data": {
- "itemId": "string",
- "property1": null,
- "property2": null
}, - "metaData": {
- "totalCount": 0,
- "requestTime": "0.11 [s]"
}
}
Gets all tag directories from the Workspace.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
curl --request GET --url https://api.synerise.com/tags-collector/directories
[- {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string",
- "params": {
- "property1": "string",
- "property2": "string"
}, - "type": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
}
]
Creates a directory.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
name required | string Name of the directory |
object Free-form parameters | |
type | string HashID of the directory type |
{- "name": "string",
- "params": {
- "property1": "string",
- "property2": "string"
}, - "type": "string"
}
{- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string",
- "params": {
- "property1": "string",
- "property2": "string"
}, - "type": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
}
Gets all directory types.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
curl --request GET --url https://api.synerise.com/tags-collector/directories/types
[- {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
]
Creates a directory type.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
name required | string Name of the directory type |
{- "name": "string"
}
{- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
Deletes a directory.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
directoryHash required | string Hash ID of the directory |
curl --request DELETE --url https://api.synerise.com/tags-collector/directories/%7BdirectoryHash%7D
Updates a directory.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
directoryHash required | string Hash ID of the directory |
name | string Name of the directory |
object Free-form parameters |
{- "name": "string",
- "params": {
- "property1": "string",
- "property2": "string"
}
}
{- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string",
- "params": {
- "property1": "string",
- "property2": "string"
}, - "type": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
}
Retrieve tags from a directory.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
directoryHash required | string Hash ID of the directory |
curl --request GET --url https://api.synerise.com/tags-collector/directories/%7BdirectoryHash%7D/tags
[- {
- "authorId": 0,
- "color": "string",
- "createdAt": "2019-08-24T14:15:22Z",
- "description": "string",
- "directory": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string",
- "params": {
- "property1": "string",
- "property2": "string"
}, - "type": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
}, - "hash": "string",
- "icon": "string",
- "priority": 0,
- "value": "string"
}
]
Assign tags to a directory.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
directoryHash required | string Hash ID of the directory |
Hash ID of a tag
[- "string"
]
Unassign tags from a directory. This does not delete the tags or the directory.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
directoryHash required | string Hash ID of the directory |
Hash ID of a tag
[- "string"
]
Update the type of a directory.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_DIRECTORY_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
directoryHash required | string Hash ID of the directory |
directoryTypeHash | string HashID of the directory type |
{- "directoryTypeHash": "string"
}
{- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string",
- "params": {
- "property1": "string",
- "property2": "string"
}, - "type": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
}
Gets a paginated list of tags that can be assigned to assets, for example promotions.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_TAG_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
page | integer Default: 0 Page to retrieve |
size | integer Default: 10 Limit of items per page |
curl --request GET --url 'https://api.synerise.com/tags-collector/tags?page=SOME_INTEGER_VALUE&size=SOME_INTEGER_VALUE'
{- "data": [
- {
- "authorId": 0,
- "color": "string",
- "createdAt": "2019-08-24T14:15:22Z",
- "description": "string",
- "directory": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string",
- "type": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
}, - "hash": "string",
- "icon": "string",
- "priority": 0,
- "value": "string"
}
], - "pagination": {
- "limit": 10,
- "page": 0,
- "pages": 0,
- "total": 0
}
}
Deletes multiple tag definitions.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_TAG_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
HashID of a tag
[- "string"
]
Deletes a tag definition.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_TAG_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
tagHash required | string HashID of a tag |
curl --request DELETE --url https://api.synerise.com/tags-collector/tags/%7BtagHash%7D
Updates a tag definition.
API consumers who can use this method: Synerise User, Profile (formerly client), Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: TAGS_COLLECTOR_TAG_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ASSETS_TAGS
tagHash required | string HashID of a tag |
color | string or null Hex code of the tag color |
description | string Description of the tag |
directory | string or null Hash ID of the directory where the tag is assigned |
icon | string or null URL of the tag's icon |
priority | integer Default: 0 Tag priority. Lower values mean higher priority. |
value | string Name of the tag |
{- "color": "string",
- "description": "string",
- "directory": "string",
- "icon": "string",
- "priority": 0,
- "value": "string"
}
{- "authorId": 0,
- "color": "string",
- "createdAt": "2019-08-24T14:15:22Z",
- "description": "string",
- "directory": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string",
- "params": {
- "property1": "string",
- "property2": "string"
}, - "type": {
- "createdAt": "2019-08-24T14:15:22Z",
- "hash": "string",
- "name": "string"
}
}, - "hash": "string",
- "icon": "string",
- "priority": 0,
- "value": "string"
}
Create a new tag that can be assigned to profiles. If you try to create a tag that already exists, the response is the existing tag.
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_TAGS_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_TAGS
name required | string Name of the tag |
color | string Display color of the tag; hexadecimal value |
{- "name": "nice tag",
- "color": "#0768ff"
}
{- "businessProfileId": 100005,
- "id": 645,
- "name": "nice tag",
- "color": "#0768ff"
}
Retrieve all tags that can be assigned to profiles.
This endpoint is available from version 4.1.0
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_TAGS_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_TAGS
Api-Version required | string Value: "4.4" |
curl --request GET --url https://api.synerise.com/v4/clients/tags --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "id": 645,
- "name": "nice tag",
- "color": "#0768ff"
}
]
Update a tag. This method currently only allows modifying the color
field.
If the tag has been already deleted, the response is a 404 error.
Important: This method doesn't update global tags (not related to any workspace). If you try to update a global tag, the response is a 404 error.
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_TAGS_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_TAGS
tagID required | integer Example: 645 ID of the tag |
color | string Display color of the tag; hexadecimal value |
{- "color": "#0768ff"
}
{- "businessProfileId": 100005,
- "id": 645,
- "name": "nice tag",
- "color": "#0768ff"
}
Remove a tag definition from the workspace.
If the tag has been already deleted, the response is a 404 error.
Important: This method does not remove global tag (not related to any workspace). In this case, the response is a 404 error.
Note: After removing a tag definition, the tag is still cached for a while. In that time, it is still possible for a while to remove or add this tag in profiles.
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_TAGS_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_TAGS
tagID required | integer Example: 645 ID of the tag |
curl --request DELETE --url https://api.synerise.com/v4/tags/%7BtagID%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "error": "string",
- "status": 0,
- "timestamp": "string",
- "path": "string",
- "message": "string",
- "errors": [
- {
- "path": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "errorCode": "string",
- "status": 0,
- "message": "string",
- "traceId": "string"
}
]
}
Retrieve a list of tags assigned to a profile.
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_TAGS_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_TAGS
clientId required | integer <int64> Example: 434428563 The ID of the profile |
curl --request GET --url https://api.synerise.com/v4/clients/%7BclientId%7D/tags --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "id": 645,
- "name": "nice tag",
- "color": "#0768ff"
}
]
Assign a tag to a profile.
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_ASSIGN_TAGS_EXECUTE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_TAGS
clientId required | integer <int64> Example: 434428563 The ID of the profile |
tagID required | integer Example: 645 ID of the tag |
curl --request POST --url https://api.synerise.com/v4/clients/%7BclientId%7D/tags/%7BtagID%7D
{- "clientId": 0,
- "id": 73,
- "tagId": 645
}
API consumers who can use this method: Workspace (formerly Business Profile), Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_ASSIGN_TAGS_EXECUTE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_TAGS
clientId required | integer <int64> Example: 434428563 The ID of the profile |
tagID required | integer Example: 645 ID of the tag |
curl --request DELETE --url https://api.synerise.com/v4/clients/%7BclientId%7D/tags/%7BtagID%7D
{- "error": "string",
- "status": 0,
- "timestamp": "string",
- "path": "string",
- "message": "string",
- "errors": [
- {
- "path": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "errorCode": "string",
- "status": 0,
- "message": "string",
- "traceId": "string"
}
]
}
Retrieve a list of Profiles. You can filter, sort, and paginate the results.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_LIST_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
sortBy | string Enum: "firstName" "lastName" "lastActivityDate" "email" "city" "phone" Example: sortBy=firstName Profile attribute by which the list will be sorted |
sortOrder | string Enum: "ASC" "DESC" Sorting order |
pageIndex | integer <int32> >= 1 Number of pages to retrieve |
pageSize | integer <int32> >= 1 Number of entries on a page |
filters[anonymous] | boolean When set to |
filters[firstName] | string Example: filters[firstName]=John Filter profiles by first name |
filters[lastName] | string Example: filters[lastName]=Smith Filter profiles by last name |
filters[email] | string Example: filters[email]=person@example.com Filter profiles by email |
filters[phone] | string Example: filters[phone]=123456789 Filter profiles by phone |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request GET --url 'https://api.synerise.com/v4/clients?sortBy=firstName&sortOrder=SOME_STRING_VALUE&pageIndex=SOME_INTEGER_VALUE&pageSize=SOME_INTEGER_VALUE&filters%5Banonymous%5D=SOME_BOOLEAN_VALUE&filters%5BfirstName%5D=John&filters%5BlastName%5D=Smith&filters%5Bemail%5D=person%40example.com&filters%5Bphone%5D=123456789' --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
[- {
- "clientId": 0,
- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "company": "string",
- "address": "string",
- "city": "string",
- "province": "string",
- "zipCode": "string",
- "countryCode": "PL",
- "birthDate": "1987-10-24",
- "sex": "FEMALE",
- "avatarUrl": "string",
- "anonymous": false,
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
], - "previousClients": [
- 0
], - "lastActivityDate": "2019-03-19T14:05:39Z"
}
]
Create a new profile in the Synerise application database. If you don't have some information about the profile, don't insert a null-value parameter - omit the parameter entirely.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_CLIENT_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_MANAGEMENT
Api-Version required | string Value: "4.4" |
In the request body, you must provide at least one of those identifiers:
email
phone
customId
uuid
string The profile's e-mail address.
By default, email is a unique identifier. If non-unique emails are enabled, this field should not be used. It is no longer an identifier. The configuration of non-unique emails includes creating an email parameter for communication. | |
phone | string Phone number of the profile
|
customId | string A custom ID for the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
firstName | string Profile's first name. The value:
|
lastName | string Profile's last name The value:
|
displayName | string Currently unused |
uuid | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
avatarUrl | string or null URL of the profile's avatar picture The value:
|
birthDate | string Date of birth in the profile. Must be in |
company | string Profiles's company The value:
|
city | string Profile's city of residence. The value:
|
address | string Profile's street address. The value:
|
zipCode | string Profile's zip code The value:
|
province | string Profile's province of residence The value:
|
countryCode | string Code of profile's country of residence in accordance with the ISO 3166 format |
sex | string Enum: "FEMALE" "MALE" "NOT_SPECIFIED" "OTHER" Profile's sex |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
{- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "avatarUrl": "string",
- "birthDate": "1987-10-24",
- "company": "string",
- "city": "string",
- "address": "string",
- "zipCode": "string",
- "province": "string",
- "countryCode": "PL",
- "sex": "FEMALE",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2019-03-18T13:15:39.84Z",
- "path": "/clients",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 12082,
- "field": "countryCode",
- "message": "Country Code must have 0 or 3 characters as per ISO format.",
- "rejectedValue": "string"
}, - {
- "code": 120,
- "field": "avatarUrl",
- "message": "120",
- "rejectedValue": "string"
}
]
}
Create a new profile that is marked as a company in the Synerise application database.
You must provide at least one of those identifiers: email
, phone
, customId
, uuid
.
Sending a null value deletes an attribute (if it's a custom attribute) or sets it to null/default value (if the attribute is Synerise-native).
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_CLIENT_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_MANAGEMENT
Api-Version required | string Value: "4.4" |
In the request body, you must provide at least one of those identifiers:
email
phone
customId
uuid
string The profile's e-mail address.
By default, email is a unique identifier. If non-unique emails are enabled, this field should not be used. It is no longer an identifier. The configuration of non-unique emails includes creating an email parameter for communication. | |
phone | string Phone number of the profile
|
customId | string A custom ID for the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
firstName | string Profile's first name. The value:
|
lastName | string Profile's last name The value:
|
displayName | string Currently unused |
uuid | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
avatarUrl | string or null URL of the profile's avatar picture The value:
|
birthDate | string Date of birth in the profile. Must be in |
company | string Profiles's company The value:
|
city | string Profile's city of residence. The value:
|
address | string Profile's street address. The value:
|
zipCode | string Profile's zip code The value:
|
province | string Profile's province of residence The value:
|
countryCode | string Code of profile's country of residence in accordance with the ISO 3166 format |
sex | string Enum: "FEMALE" "MALE" "NOT_SPECIFIED" "OTHER" Profile's sex |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
{- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "avatarUrl": "string",
- "birthDate": "1987-10-24",
- "company": "string",
- "city": "string",
- "address": "string",
- "zipCode": "string",
- "province": "string",
- "countryCode": "PL",
- "sex": "FEMALE",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2019-03-18T13:15:39.84Z",
- "path": "/clients",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 12082,
- "field": "countryCode",
- "message": "Country Code must have 0 or 3 characters as per ISO format.",
- "rejectedValue": "string"
}, - {
- "code": 120,
- "field": "avatarUrl",
- "message": "120",
- "rejectedValue": "string"
}
]
}
Delete a company profile from the database.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BY_ID_CLIENT_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
clientId required | integer <int64> Example: 434428563 The ID of the profile |
Accept required | string Value: "application/json" |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request DELETE --url https://api.synerise.com/v4/company-clients/%7BclientId%7D --header 'Accept: SOME_STRING_VALUE' --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2020-10-29T13:08:16.235Z",
- "path": "/exampleEndpoint",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 120,
- "field": "exampleField",
- "message": "120",
- "rejectedValue": "exampleValue"
}
]
}
Moves profile UUIDs to a single profile (which must already exist) and removes the profiles that were merged.
The event history of the source profiles is moved to the target profile.
The attributes (data from the attributes
object) that don't exist in the target profile are copied to the target profile. If an attribute already exists in the target profile, the value from the source profile is lost.
The properties and tags of the source profiles are lost, even if they don't have a value in the target profile.
WARNING: This operation is irreversible. Use it carefully.
WARNING: You should not try to merge more than 10-20 profiles at once.
For more details, see the Developer Guide.
API consumer who can use this method: Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_MERGEBYCUSTOMID_CLIENT_UPDATE
sourceCustomIDs required | string Example: customIdExample,customIdExample2,customIdExample3,customIdExample4,customIdExample5 Comma-delimited string with custom IDs of the profiles to merge |
targetCustomID required | string Example: customIdExample The custom ID of the profile to merge the |
Accept required | string Value: "application/json" |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request POST --url https://api.synerise.com/v4/clients/merge/from/custom-ids/%7BsourceCustomIDs%7D/to/custom-id/%7BtargetCustomID%7D --header 'Accept: SOME_STRING_VALUE' --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "clientId": 0,
- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "company": "string",
- "address": "string",
- "city": "string",
- "province": "string",
- "zipCode": "string",
- "countryCode": "PL",
- "birthDate": "1987-10-24",
- "sex": "FEMALE",
- "avatarUrl": "string",
- "anonymous": false,
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
], - "previousClients": [
- 0
], - "lastActivityDate": "2019-03-19T14:05:39Z"
}
Moves profile UUIDs to a single profile (which must already exist) and removes the profiles that were merged.
The event history of the source profiles is moved to the target profile.
The attributes (data from the attributes
object) that don't exist in the target profile are copied to the target profile. If an attribute already exists in the target profile, the value from the source profile is lost.
The properties and tags of the source profiles are lost, even if they don't have a value in the target profile.
WARNING: This operation is irreversible. Use it carefully.
WARNING: You should not try to merge more than 10-20 profiles at once.
For more details, see the Developer Guide.
API consumer who can use this method: Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_MERGE_BY_ID_CLIENT_UPDATE
fromClientIds required | string Example: 434428563,33322211,232212342 Comma-delimited string with client IDs of the profiles to merge |
toClientId required | integer <int64> Example: 434428563 The ID of the profile to merge the |
Accept required | string Value: "application/json" |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request POST --url https://api.synerise.com/v4/clients/merge/from/ids/%7BfromClientIds%7D/to/id/%7BtoClientId%7D --header 'Accept: SOME_STRING_VALUE' --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "clientId": 0,
- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "company": "string",
- "address": "string",
- "city": "string",
- "province": "string",
- "zipCode": "string",
- "countryCode": "PL",
- "birthDate": "1987-10-24",
- "sex": "FEMALE",
- "avatarUrl": "string",
- "anonymous": false,
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
], - "previousClients": [
- 0
], - "lastActivityDate": "2019-03-19T14:05:39Z"
}
Enqueue a number of add/update operations in the Synerise application database.
If you don't have some information about a profile, don't insert a null-value parameter - omit the parameter entirely. Sending a null value deletes an attribute (if it's a custom attribute) or sets it to null/default value (if the attribute is Synerise-native).
The body contains an array of objects to update. The objects are the same as in the Create a Profile and Update a Profile endpoints.
IMPORTANT: The request body cannot contain more than 1000 items or exceed 1 MB in size.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BATCH_CLIENT_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_MANAGEMENT
Accept required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
Each profile must have at least one of the following identifiers:
email
phone
customId
uuid
clientId
(can be used only when updating an existing profile)clientId | integer <int64> This ID can be used only for updating an existing profile. If a profile does not exist and |
string The profile's e-mail address.
By default, email is a unique identifier. If non-unique emails are enabled, this field should not be used. It is no longer an identifier. The configuration of non-unique emails includes creating an email parameter for communication. | |
phone | string Phone number of the profile
|
customId | string A custom ID for the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
firstName | string Profile's first name. The value:
|
lastName | string Profile's last name The value:
|
displayName | string Currently unused |
uuid | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
avatarUrl | string or null URL of the profile's avatar picture The value:
|
birthDate | string Date of birth in the profile. Must be in |
company | string Profiles's company The value:
|
city | string Profile's city of residence. The value:
|
address | string Profile's street address. The value:
|
zipCode | string Profile's zip code The value:
|
province | string Profile's province of residence The value:
|
countryCode | string Code of profile's country of residence in accordance with the ISO 3166 format |
sex | string Enum: "FEMALE" "MALE" "NOT_SPECIFIED" "OTHER" Profile's sex |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
[- {
- "clientId": 0,
- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "avatarUrl": "string",
- "birthDate": "1987-10-24",
- "company": "string",
- "city": "string",
- "address": "string",
- "zipCode": "string",
- "province": "string",
- "countryCode": "PL",
- "sex": "FEMALE",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
]
[- {
- "rejectedValue": "de73b3490c4-bb8c0d8",
- "field": "list[0].uuid",
- "status": 400,
- "message": "UUID must be well-formed value as per RFC 4122"
}
]
Retrieve profile data by profile ID.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BY_ID_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
clientId required | integer <int64> Example: 434428563 The ID of the profile |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request GET --url https://api.synerise.com/v4/clients/%7BclientId%7D --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "clientId": 0,
- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "company": "string",
- "address": "string",
- "city": "string",
- "province": "string",
- "zipCode": "string",
- "countryCode": "PL",
- "birthDate": "1987-10-24",
- "sex": "FEMALE",
- "avatarUrl": "string",
- "anonymous": false,
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
], - "previousClients": [
- 0
], - "lastActivityDate": "2019-03-19T14:05:39Z"
}
Change the details of a profile in the Synerise application database.
Sending a null value deletes an attribute (if it's a custom attribute) or sets it to null/default value (if the attribute is Synerise-native).
The attributes
object can be used to add custom attributes of your choice. For example, "hasDog":true
.
The tags
array contains custom tags of your choice.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BY_ID_CLIENT_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
clientId required | integer <int64> Example: 434428563 The ID of the profile |
Api-Version required | string Value: "4.4" |
string The profile's e-mail address.
By default, email is a unique identifier. If non-unique emails are enabled, this field should not be used. It is no longer an identifier. The configuration of non-unique emails includes creating an email parameter for communication. | |
phone | string Phone number of the profile
|
customId | string A custom ID for the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
firstName | string Profile's first name. The value:
|
lastName | string Profile's last name The value:
|
displayName | string Currently unused |
uuid | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
avatarUrl | string or null URL of the profile's avatar picture The value:
|
birthDate | string Date of birth in the profile. Must be in |
company | string Profiles's company The value:
|
city | string Profile's city of residence. The value:
|
address | string Profile's street address. The value:
|
zipCode | string Profile's zip code The value:
|
province | string Profile's province of residence The value:
|
countryCode | string Code of profile's country of residence in accordance with the ISO 3166 format |
sex | string Enum: "FEMALE" "MALE" "NOT_SPECIFIED" "OTHER" Profile's sex |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
{- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "avatarUrl": "string",
- "birthDate": "1987-10-24",
- "company": "string",
- "city": "string",
- "address": "string",
- "zipCode": "string",
- "province": "string",
- "countryCode": "PL",
- "sex": "FEMALE",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2019-03-21T08:37:34.526Z",
- "path": "/clients/1234",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 12053,
- "field": "uuid",
- "message": "UUID must be well-formed value as per RFC 4122",
- "rejectedValue": "4321"
}
]
}
Delete a profile from the database.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BY_ID_CLIENT_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
clientId required | integer <int64> Example: 434428563 The ID of the profile |
Accept required | string Value: "application/json" |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request DELETE --url https://api.synerise.com/v4/clients/%7BclientId%7D --header 'Accept: SOME_STRING_VALUE' --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2020-10-29T13:08:16.235Z",
- "path": "/exampleEndpoint",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 120,
- "field": "exampleField",
- "message": "120",
- "rejectedValue": "exampleValue"
}
]
}
Change the details of a profile in the Synerise application database.
Sending a null value deletes an attribute (if it's a custom attribute) or sets it to null/default value (if the attribute is Synerise-native).
The attributes
object can be used to add custom attributes of your choice. For example, "hasDog":true
.
The tags
array contains custom tags of your choice.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BY_EMAIL_CLIENT_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
clientEmail required | string Example: clientemail@synerise.com The profile's email address
|
Api-Version required | string Value: "4.4" |
string The profile's e-mail address.
By default, email is a unique identifier. If non-unique emails are enabled, this field should not be used. It is no longer an identifier. The configuration of non-unique emails includes creating an email parameter for communication. | |
phone | string Phone number of the profile
|
customId | string A custom ID for the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
firstName | string Profile's first name. The value:
|
lastName | string Profile's last name The value:
|
displayName | string Currently unused |
uuid | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
avatarUrl | string or null URL of the profile's avatar picture The value:
|
birthDate | string Date of birth in the profile. Must be in |
company | string Profiles's company The value:
|
city | string Profile's city of residence. The value:
|
address | string Profile's street address. The value:
|
zipCode | string Profile's zip code The value:
|
province | string Profile's province of residence The value:
|
countryCode | string Code of profile's country of residence in accordance with the ISO 3166 format |
sex | string Enum: "FEMALE" "MALE" "NOT_SPECIFIED" "OTHER" Profile's sex |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
{- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "avatarUrl": "string",
- "birthDate": "1987-10-24",
- "company": "string",
- "city": "string",
- "address": "string",
- "zipCode": "string",
- "province": "string",
- "countryCode": "PL",
- "sex": "FEMALE",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2019-03-21T08:37:34.526Z",
- "path": "/clients/by-email/client@synerise.com",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 12053,
- "field": "uuid",
- "message": "UUID must be well-formed value as per RFC 4122",
- "rejectedValue": "4321"
}
]
}
Change the details of a profile in the Synerise application database.
Sending a null value deletes an attribute (if it's a custom attribute) or sets it to null/default value (if the attribute is Synerise-native).
The attributes
object can be used to add custom attributes of your choice. For example, "hasDog":true
.
The tags
array contains custom tags of your choice.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BY_CUSTOM_ID_CLIENT_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
customId required | string Example: customIdExample The custom ID of the profile |
Api-Version required | string Value: "4.4" |
string The profile's e-mail address.
By default, email is a unique identifier. If non-unique emails are enabled, this field should not be used. It is no longer an identifier. The configuration of non-unique emails includes creating an email parameter for communication. | |
phone | string Phone number of the profile
|
customId | string A custom ID for the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
firstName | string Profile's first name. The value:
|
lastName | string Profile's last name The value:
|
displayName | string Currently unused |
uuid | string UUID of the Profile. It is a unique identifier. The value can't include any characters that match the pattern (ECMA flavor): |
avatarUrl | string or null URL of the profile's avatar picture The value:
|
birthDate | string Date of birth in the profile. Must be in |
company | string Profiles's company The value:
|
city | string Profile's city of residence. The value:
|
address | string Profile's street address. The value:
|
zipCode | string Profile's zip code The value:
|
province | string Profile's province of residence The value:
|
countryCode | string Code of profile's country of residence in accordance with the ISO 3166 format |
sex | string Enum: "FEMALE" "MALE" "NOT_SPECIFIED" "OTHER" Profile's sex |
object This object contains the marketing agreements of the Profile. You can also pass the values as strings ( | |
object This object contains custom attributes that can have any name (except for reserved attributes, see warning below) and data type, as required by your integration. The attribute names can't include any characters that match the pattern (ECMA flavor): String values:
If you want to send a date/time attribute for use in analytics, take the following into account:
WARNING: Some attributes are reserved and cannot be sent. If you send them, they are ignored. Click to expand the list of reserved attributesemail clientId phone customId uuid firstName lastName displayName company address city province zipCode countryCode birthDate sex avatarUrl anonymous agreements tags businessProfileId time ip source newsletter_agreement custom_identify firstname lastname created updated last_activity_date birthdate external_avatar_url displayname receive_smses receive_push_messages receive_webpush_messages receive_btooth_messages receive_rfid_messages receive_wifi_messages confirmation_hash ownerId zipCode anonymous_type country_id geo_loc_city geo_loc_country geo_loc_as geo_loc_country_code geo_loc_isp geo_loc_lat geo_loc_lon geo_loc_org geo_loc_query geo_loc_region geo_loc_region_name geo_loc_status geo_loc_timezone geo_loc_zip club_card_id type confirmed facebookId status
| |
tags | Array of strings Tags can be used to group profiles. Tag names (strings):
|
{- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "avatarUrl": "string",
- "birthDate": "1987-10-24",
- "company": "string",
- "city": "string",
- "address": "string",
- "zipCode": "string",
- "province": "string",
- "countryCode": "PL",
- "sex": "FEMALE",
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
]
}
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2019-03-21T08:37:34.526Z",
- "path": "/clients/by-customid/customId1234",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 12053,
- "field": "uuid",
- "message": "UUID must be well-formed value as per RFC 4122",
- "rejectedValue": "4321"
}
]
}
Delete a profile from the database.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BY_ID_CLIENT_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
customId required | string Example: customIdExample The custom ID of the profile |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request DELETE --url https://api.synerise.com/v4/clients/by-custom-id/%7BcustomId%7D --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "error": "Bad Request",
- "status": 400,
- "timestamp": "2020-10-29T13:08:16.235Z",
- "path": "/exampleEndpoint",
- "message": "Some fields did not pass validation",
- "errors": [
- {
- "code": 120,
- "field": "exampleField",
- "message": "120",
- "rejectedValue": "exampleValue"
}
]
}
Get the details of a single profile. If no profile is found, HTTP 404 is returned.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: API_BY_IDENTIFIER_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
identifierType required | string Enum: "by-custom-id" "by-phone" "by-uuid" "by-email" Example: by-email The type of profile identifier to use for the request |
identifierValue required | string Example: address@domain.com The value of the selected identifier |
Content-Type required | string Value: "application/json" |
Api-Version required | string Value: "4.4" |
curl --request GET --url https://api.synerise.com/v4/clients/%7BidentifierType%7D/%7BidentifierValue%7D --header 'Api-Version: SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "clientId": 0,
- "email": "string",
- "phone": "+48111222333",
- "customId": "string",
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "firstName": "string",
- "lastName": "string",
- "displayName": "string",
- "company": "string",
- "address": "string",
- "city": "string",
- "province": "string",
- "zipCode": "string",
- "countryCode": "PL",
- "birthDate": "1987-10-24",
- "sex": "FEMALE",
- "avatarUrl": "string",
- "anonymous": false,
- "agreements": {
- "email": false,
- "sms": false,
- "push": false,
- "webPush": false,
- "bluetooth": false,
- "rfid": false,
- "wifi": false
}, - "attributes": {
- "property1": null,
- "property2": null
}, - "tags": [
- "string"
], - "previousClients": [
- 0
], - "lastActivityDate": "2019-03-19T14:05:39Z"
}
Create an export task. The data is later retrieved using this endpoint. The data is materialized at the time of export's creation, not at the time of retrieval.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CLIENT_EXPORTER_REPORT_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: SETTINGS_EXPORT
Segmentation request body
name required | string The name of the export |
fields required | Array of strings An array of fields from the profile to include in the export |
agreementFilter required | string Enum: "NONE" "RECOGNIZED" "ANONYMOUS" Filter exported profiles by status: only anonymous, only recognized, or no filter |
segmentationHash required | string Segmentation (UUID) to export profiles from |
expressions | Array of strings An array of expressions (expression UUIDs) whose results will be included in the export. In the export results, the result of the analysis is identified by the UUID. |
aggregates | Array of strings An array of aggregates (aggregate UUIDs) whose results will be included in the export. In the export results, the result of the analysis is identified by the UUID. |
excludedIds required | Array of integers <= 0 items [ items ] Necessary for backwards compatibility. Send empty array. |
{- "name": "Sample export",
- "fields": [
- "firstname"
], - "agreementFilter": "NONE",
- "segmentationHash": "a0640816-8092-4a17-b41e-cd9e1230a3c7",
- "expressions": [
- "1e5d5fde-4abf-48d5-b3bd-33e1babbc646"
], - "aggregates": [
- "dc8de7ff-2cf2-4ccd-900e-3c8bd4631f00"
], - "excludedIds": [ ]
}
{- "taskId": 546,
- "columnOrder": [
- "id",
- "firstname"
], - "estimatedCount": 6743,
- "ttl": "2h"
}
Retrieve data from an export created before. The data is materialized at the time of export's creation, not at the time of retrieval.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CLIENT_EXPORTER_REPORT_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: SETTINGS_EXPORT
taskId required | integer Example: 546 The ID of the export task to retrieve the results from |
limit | integer <= 10000 The limit of results retrieved. Used for pagination. |
offset | integer The index of the first result to retrieve. The first result has the index |
curl --request GET --url 'https://api.synerise.com/client-exporter/v2/export/clients/task/%7BtaskId%7D?limit=SOME_INTEGER_VALUE&offset=SOME_INTEGER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "id": 123,
- "name": "John",
- "email": "john@synerise.pl"
}
]
Retrieve the details of a Profile.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_DETAILS_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
clientId required | integer Profile ID |
curl --request GET --url https://api.synerise.com/crm/v1/clients/%7BclientId%7D/contacts --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "base": {
- "property1": {
- "label": "string",
- "value": null
}, - "property2": {
- "label": "string",
- "value": null
}
}, - "tags": [
- "string"
]
}
Update a Profile.
Sending a null value deletes an attribute (if it's a custom attribute) or sets it to null/default value (if the attribute is Synerise-native).
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_CLIENT_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_MANAGEMENT
clientId required | integer Profile ID |
id | integer ID of the Profile |
uuid | string UUID of the Profile |
anonymous_type | string If the Profile is anonymous, this field defines how they are identified |
string Profile's e-mail address | |
firstname | string Profile's first name |
lastName | string Profile's last name |
custom_identify | string A custom ID for the Profile |
company | string Profile's company |
phone | string Profile's phone number |
address | string Profile's street address |
birthdate | string Profile's date of birth |
city | string Profile's city of residence |
zipCode | string Profile's zip code |
province | string Profile's province of residence |
country_id | string ID of the Profile's country of residence |
countryCode | string Code of Profile's country of residence |
avatarUrl | string or null URL of the Profile's avatar picture |
sex | string Enum: "FEMALE" "MALE" "UNDEFINED" Profile's sex |
last_activity_date | string <date> Date of Profile's last activity |
created | string <date> Date when the Profile was created |
updated | string <date> Date when the Profile account was last updated |
deletedAt | string <date> Date when the Profile account was deleted |
tags | Array of strings Custom tags. They can be used, for example, to group Profiles. |
{- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "anonymous_type": "UUID",
- "email": "string",
- "firstname": "string",
- "lastName": "string",
- "custom_identify": "string",
- "company": "string",
- "phone": "string",
- "address": "string",
- "birthdate": "string",
- "city": "string",
- "zipCode": "string",
- "province": "string",
- "country_id": "string",
- "countryCode": "PL",
- "avatarUrl": "string",
- "sex": "FEMALE",
- "last_activity_date": "2019-08-24",
- "created": "2019-08-24",
- "updated": "2019-08-24",
- "deletedAt": "2019-08-24",
- "tags": [
- "string"
]
}
{- "base": {
- "property1": {
- "label": "string",
- "value": null
}, - "property2": {
- "label": "string",
- "value": null
}
}, - "tags": [
- "string"
]
}
Retrieve a list of profiles. You can sort and filter the results.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
limit | integer <int32> Default: 25 The maximum number of items to retrieve. This can be used for pagination. |
offset | integer <int32> Default: 0 The ID of the first item to retrieve. This is used for pagination. For example, to retrieve items starting at number 11, set offset to 10. |
recognized | string Default: "NONE" Enum: "RECOGNIZED" "true" "ANONYMOUS" "false" "NONE" Filter the results by Profile's anonymity status. |
search | stringfield:value Example: search=firstName:John Filter the results by parameter values. If you enter a simple string (not a |
sortBy | stringfield:orderType Choose a parameter to sort the results. |
curl --request GET --url 'https://api.synerise.com/crm/v1/list?limit=SOME_INTEGER_VALUE&offset=SOME_INTEGER_VALUE&recognized=SOME_STRING_VALUE&search=firstName%3AJohn&sortBy=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "customers": [
- {
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "anonymous_type": "UUID",
- "email": "string",
- "firstname": "string",
- "lastName": "string",
- "custom_identify": "string",
- "company": "string",
- "phone": "string",
- "address": "string",
- "birthdate": "string",
- "city": "string",
- "zipCode": "string",
- "province": "string",
- "country_id": "string",
- "countryCode": "PL",
- "avatarUrl": "string",
- "sex": "FEMALE",
- "last_activity_date": "2019-08-24",
- "created": "2019-08-24",
- "updated": "2019-08-24",
- "deletedAt": "2019-08-24",
- "tags": [
- "string"
]
}
], - "all": 0,
- "limit": 0,
- "offset": 0,
- "matching": 0
}
Get autocomplete suggestions for a Profile search. The suggestions are ordered by relevance.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_AUTOCOMPLETE_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
field required | string Example: field=lastName The field to get suggestions from |
prefix required | string Prefix that triggers this autocomplete rule |
limit | integer Default: 10 The maximum number of suggestions to retrieve |
curl --request GET --url 'https://api.synerise.com/crm/v1/autocomplete?field=lastName&prefix=SOME_STRING_VALUE&limit=SOME_INTEGER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "entries": [
- "string"
]
}
Update a company Profile. Do not send null-values for already existing fields that you do not want to change, they will be overwritten.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_CLIENT_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_MANAGEMENT
clientId required | integer Profile ID |
id | integer ID of the Profile |
uuid | string UUID of the Profile |
anonymous_type | string If the Profile is anonymous, this field defines how they are identified |
string Profile's e-mail address | |
firstname | string Profile's first name |
lastName | string Profile's last name |
custom_identify | string A custom ID for the Profile |
company | string Profile's company |
phone | string Profile's phone number |
address | string Profile's street address |
birthdate | string Profile's date of birth |
city | string Profile's city of residence |
zipCode | string Profile's zip code |
province | string Profile's province of residence |
country_id | string ID of the Profile's country of residence |
countryCode | string Code of Profile's country of residence |
avatarUrl | string or null URL of the Profile's avatar picture |
sex | string Enum: "FEMALE" "MALE" "UNDEFINED" Profile's sex |
last_activity_date | string <date> Date of Profile's last activity |
created | string <date> Date when the Profile was created |
updated | string <date> Date when the Profile account was last updated |
deletedAt | string <date> Date when the Profile account was deleted |
tags | Array of strings Custom tags. They can be used, for example, to group Profiles. |
{- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "anonymous_type": "UUID",
- "email": "string",
- "firstname": "string",
- "lastName": "string",
- "custom_identify": "string",
- "company": "string",
- "phone": "string",
- "address": "string",
- "birthdate": "string",
- "city": "string",
- "zipCode": "string",
- "province": "string",
- "country_id": "string",
- "countryCode": "PL",
- "avatarUrl": "string",
- "sex": "FEMALE",
- "last_activity_date": "2019-08-24",
- "created": "2019-08-24",
- "updated": "2019-08-24",
- "deletedAt": "2019-08-24",
- "tags": [
- "string"
]
}
{- "base": {
- "property1": {
- "label": "string",
- "value": null
}, - "property2": {
- "label": "string",
- "value": null
}
}, - "tags": [
- "string"
]
}
Identifies a Profile as a company.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_CLIENT_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_MANAGEMENT
clientId required | integer Profile ID |
curl --request POST --url https://api.synerise.com/crm/v1/company-clients/%7BclientId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "base": {
- "property1": {
- "label": "string",
- "value": null
}, - "property2": {
- "label": "string",
- "value": null
}
}, - "tags": [
- "string"
]
}
Retrieve the details of a company Profile.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_DETAILS_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
clientId required | integer Profile ID |
curl --request GET --url https://api.synerise.com/crm/v1/company-clients/%7BclientId%7D/contacts --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "base": {
- "property1": {
- "label": "string",
- "value": null
}, - "property2": {
- "label": "string",
- "value": null
}
}, - "tags": [
- "string"
]
}
Retrieve a detailed list of Profiles that are identified as companies.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
limit | integer <int32> Default: 25 The maximum number of items to retrieve. This can be used for pagination. |
offset | integer <int32> Default: 0 The ID of the first item to retrieve. This is used for pagination. For example, to retrieve items starting at number 11, set offset to 10. |
recognized | string Default: "NONE" Enum: "RECOGNIZED" "true" "ANONYMOUS" "false" "NONE" Filter the results by Profile's anonymity status. |
sortBy | stringfield:orderType Choose a parameter to sort the results. |
curl --request GET --url 'https://api.synerise.com/crm/v1/company-clients?limit=SOME_INTEGER_VALUE&offset=SOME_INTEGER_VALUE&recognized=SOME_STRING_VALUE&sortBy=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "customers": [
- {
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "anonymous_type": "UUID",
- "email": "string",
- "firstname": "string",
- "lastName": "string",
- "custom_identify": "string",
- "company": "string",
- "phone": "string",
- "address": "string",
- "birthdate": "string",
- "city": "string",
- "zipCode": "string",
- "province": "string",
- "country_id": "string",
- "countryCode": "PL",
- "avatarUrl": "string",
- "sex": "FEMALE",
- "last_activity_date": "2019-08-24",
- "created": "2019-08-24",
- "updated": "2019-08-24",
- "deletedAt": "2019-08-24",
- "tags": [
- "string"
]
}
], - "all": 0,
- "limit": 0,
- "offset": 0,
- "matching": 0
}
Retrieve a list of Profiles assigned to a company.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permissions required: CRM_LIST_CLIENT_READ, CRM_DETAILS_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
clientId required | integer Profile ID |
limit | integer <int32> Default: 25 The maximum number of items to retrieve. This can be used for pagination. |
offset | integer <int32> Default: 0 The ID of the first item to retrieve. This is used for pagination. For example, to retrieve items starting at number 11, set offset to 10. |
curl --request GET --url 'https://api.synerise.com/crm/v1/company-clients/%7BclientId%7D/relations?limit=SOME_INTEGER_VALUE&offset=SOME_INTEGER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "customers": [
- {
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "anonymous_type": "UUID",
- "email": "string",
- "firstname": "string",
- "lastName": "string",
- "custom_identify": "string",
- "company": "string",
- "phone": "string",
- "address": "string",
- "birthdate": "string",
- "city": "string",
- "zipCode": "string",
- "province": "string",
- "country_id": "string",
- "countryCode": "PL",
- "avatarUrl": "string",
- "sex": "FEMALE",
- "last_activity_date": "2019-08-24",
- "created": "2019-08-24",
- "updated": "2019-08-24",
- "deletedAt": "2019-08-24",
- "tags": [
- "string"
]
}
], - "all": 0,
- "limit": 0,
- "offset": 0,
- "matching": 0
}
Retrieve the company that a Profile is assigned to.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_DETAILS_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
clientId required | integer Profile ID |
curl --request GET --url https://api.synerise.com/crm/v1/clients/%7BclientId%7D/company --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
"string"
Retrieve the name of the attribute that is used to identify company-type Profiles.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
curl --request GET --url https://api.synerise.com/crm/v1/company-clients-identifier --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
"string"
Retrieve a list of Profiles from a local (ad-hoc) segmentation.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_FROM_LOCAL_SEGMENTATION_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
UUID required | string <uuid> Local segmentation UUID |
limit | integer <int32> Default: 25 The maximum number of items to retrieve. This can be used for pagination. |
offset | integer <int32> Default: 0 The ID of the first item to retrieve. This is used for pagination. For example, to retrieve items starting at number 11, set offset to 10. |
recognized | string Default: "NONE" Enum: "RECOGNIZED" "true" "ANONYMOUS" "false" "NONE" Filter the results by Profile's anonymity status. |
search | stringfield:value Example: search=firstName:John Filter the results by parameter values. If you enter a simple string (not a |
curl --request GET --url 'https://api.synerise.com/crm/v1/segmentations/local/%7BUUID%7D/clients?limit=SOME_INTEGER_VALUE&offset=SOME_INTEGER_VALUE&recognized=SOME_STRING_VALUE&search=firstName%3AJohn' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "customers": [
- {
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "anonymous_type": "UUID",
- "email": "string",
- "firstname": "string",
- "lastName": "string",
- "custom_identify": "string",
- "company": "string",
- "phone": "string",
- "address": "string",
- "birthdate": "string",
- "city": "string",
- "zipCode": "string",
- "province": "string",
- "country_id": "string",
- "countryCode": "PL",
- "avatarUrl": "string",
- "sex": "FEMALE",
- "last_activity_date": "2019-08-24",
- "created": "2019-08-24",
- "updated": "2019-08-24",
- "deletedAt": "2019-08-24",
- "tags": [
- "string"
]
}
], - "all": 0,
- "limit": 0,
- "offset": 0,
- "matching": 0
}
Retrieve a list of Profiles from a segmentation. Unlike ad-hoc segmentations, these are available from the Analytics > Segmentations menu.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_FROM_SEGMENTATION_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
UUID required | string <uuid> UUID of the segmentation |
limit | integer <int32> Default: 25 The maximum number of items to retrieve. This can be used for pagination. |
offset | integer <int32> Default: 0 The ID of the first item to retrieve. This is used for pagination. For example, to retrieve items starting at number 11, set offset to 10. |
recognized | string Default: "NONE" Enum: "RECOGNIZED" "true" "ANONYMOUS" "false" "NONE" Filter the results by Profile's anonymity status. |
search | stringfield:value Example: search=firstName:John Filter the results by parameter values. If you enter a simple string (not a |
sortBy | stringfield:orderType Choose a parameter to sort the results. |
curl --request GET --url 'https://api.synerise.com/crm/v1/segmentations/%7BUUID%7D/clients?limit=SOME_INTEGER_VALUE&offset=SOME_INTEGER_VALUE&recognized=SOME_STRING_VALUE&search=firstName%3AJohn&sortBy=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "customers": [
- {
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "anonymous_type": "UUID",
- "email": "string",
- "firstname": "string",
- "lastName": "string",
- "custom_identify": "string",
- "company": "string",
- "phone": "string",
- "address": "string",
- "birthdate": "string",
- "city": "string",
- "zipCode": "string",
- "province": "string",
- "country_id": "string",
- "countryCode": "PL",
- "avatarUrl": "string",
- "sex": "FEMALE",
- "last_activity_date": "2019-08-24",
- "created": "2019-08-24",
- "updated": "2019-08-24",
- "deletedAt": "2019-08-24",
- "tags": [
- "string"
]
}
], - "all": 0,
- "limit": 0,
- "offset": 0,
- "matching": 0
}
Create a new local segmentation. Local segmentations are set up ad-hoc when you're using filters on the list of Profiles in CRM.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_FROM_LOCAL_SEGMENTATION_CLIENT_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
recognized | string Default: "NONE" Enum: "RECOGNIZED" "true" "ANONYMOUS" "false" "NONE" Filter the results by Profile's anonymity status. |
The body of this request contains a request to the analytics service.
{ }
"e1ba2639-bab9-4951-a21b-1488b085b7b6"
A segmentation's results change in real-time due to constant Profile activity.
A materialization allows you to take a "snapshot" of the segmentation that can be used for further work. The materialization includes the Profiles that the segmentation returned at the time this request was received.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_FROM_MATERIALIZATION_CLIENT_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
segment | string UUID of the segmentation |
{- "segment": "string"
}
{- "materializationId": 0,
- "expiration": "2019-08-24T14:15:22Z",
- "count": 0
}
You can retrieve the list of Profiles from a materialization.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_LIST_FROM_MATERIALIZATION_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_LIST
materializationId required | integer ID of the materialization |
limit | integer <int32> Default: 25 The maximum number of items to retrieve. This can be used for pagination. |
offset | integer <int32> Default: 0 The ID of the first item to retrieve. This is used for pagination. For example, to retrieve items starting at number 11, set offset to 10. |
curl --request GET --url 'https://api.synerise.com/crm/v1/clients/list/%7BmaterializationId%7D?limit=SOME_INTEGER_VALUE&offset=SOME_INTEGER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "materializationId": 0,
- "customers": [
- {
- "id": 0,
- "uuid": "07243772-008a-42e1-ba37-c3807cebde8f",
- "anonymous_type": "UUID",
- "email": "string",
- "firstname": "string",
- "lastName": "string",
- "custom_identify": "string",
- "company": "string",
- "phone": "string",
- "address": "string",
- "birthdate": "string",
- "city": "string",
- "zipCode": "string",
- "province": "string",
- "country_id": "string",
- "countryCode": "PL",
- "avatarUrl": "string",
- "sex": "FEMALE",
- "last_activity_date": "2019-08-24",
- "created": "2019-08-24",
- "updated": "2019-08-24",
- "deletedAt": "2019-08-24",
- "tags": [
- "string"
]
}
], - "offset": 0,
- "limit": 0
}
Retrieve the date of a Profile's last activity.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: CRM_DETAILS_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_INFO
clientId required | integer Profile ID |
curl --request GET --url https://api.synerise.com/crm/v1/clients/%7BclientId%7D/last-activity --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "last_activity_date": "2019-08-24T14:15:22Z"
}
Retrieve all notes associated with a single profile.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: NOTES_SERVICE_ALL_NOTES_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_NOTES
clientId required | integer <int64> Profile ID |
curl --request GET --url https://api.synerise.com/notes-service/by-id/%7BclientId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
[- {
- "body": "<h1>NOTE 1</h1>\\n<p>Some text</p>\\n<ul>\\n<li>1</li>\\n<li>2</li>\\n<li>3</li>\\n</ul>\\n<blockquote>Lorem ipsum in quote</blockquote>\\n<p><strong>Lorem ipsum in bold</strong></p>\\n",
- "created": 1564646611.556,
- "createdBy": "example@example.com",
- "id": "69b0e925-086a-4964-b8dc-4c9e58213cf5",
- "subject": "Note 1",
- "updated": 1564646618.556,
- "updatedBy": "example@example.com",
- "userId": 11405
}
]
Create a new note in the profile
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: NOTES_SERVICE_NOTE_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_NOTES
clientId required | integer <int64> Profile ID |
subject | string The title of the note |
body | string Text of the note |
{- "subject": "Note 1",
- "body": "<h1>NOTE 1</h1>\\n<p>Some text</p>\\n<ul>\\n<li>1</li>\\n<li>2</li>\\n<li>3</li>\\n</ul>\\n<blockquote>Lorem ipsum in quote</blockquote>\\n<p><strong>Lorem ipsum in bold</strong></p>\\n"
}
{- "body": "<h1>NOTE 1</h1>\\n<p>Some text</p>\\n<ul>\\n<li>1</li>\\n<li>2</li>\\n<li>3</li>\\n</ul>\\n<blockquote>Lorem ipsum in quote</blockquote>\\n<p><strong>Lorem ipsum in bold</strong></p>\\n",
- "created": 1564646611.556,
- "createdBy": "example@example.com",
- "id": "69b0e925-086a-4964-b8dc-4c9e58213cf5",
- "subject": "Note 1",
- "updated": 1564646618.556,
- "updatedBy": "example@example.com",
- "userId": 11405
}
Retrieve a single note
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: NOTES_SERVICE_NOTE_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_NOTES
clientId required | integer <int64> Profile ID |
noteId required | string Note UUID |
curl --request GET --url https://api.synerise.com/notes-service/by-id/%7BclientId%7D/%7BnoteId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
{- "body": "<h1>NOTE 1</h1>\\n<p>Some text</p>\\n<ul>\\n<li>1</li>\\n<li>2</li>\\n<li>3</li>\\n</ul>\\n<blockquote>Lorem ipsum in quote</blockquote>\\n<p><strong>Lorem ipsum in bold</strong></p>\\n",
- "created": 1564646611.556,
- "createdBy": "example@example.com",
- "id": "69b0e925-086a-4964-b8dc-4c9e58213cf5",
- "subject": "Note 1",
- "updated": 1564646618.556,
- "updatedBy": "example@example.com",
- "userId": 11405
}
You can update an existing note.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: NOTES_SERVICE_NOTE_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_NOTES
clientId required | integer <int64> Profile ID |
noteId required | string Note UUID |
subject | string The title of the note |
body | string Text of the note |
{- "subject": "Note 1",
- "body": "<h1>NOTE 1</h1>\\n<p>Some text</p>\\n<ul>\\n<li>1</li>\\n<li>2</li>\\n<li>3</li>\\n</ul>\\n<blockquote>Lorem ipsum in quote</blockquote>\\n<p><strong>Lorem ipsum in bold</strong></p>\\n"
}
{- "body": "<h1>NOTE 1</h1>\\n<p>Some text</p>\\n<ul>\\n<li>1</li>\\n<li>2</li>\\n<li>3</li>\\n</ul>\\n<blockquote>Lorem ipsum in quote</blockquote>\\n<p><strong>Lorem ipsum in bold</strong></p>\\n",
- "created": 1564646611.556,
- "createdBy": "example@example.com",
- "id": "69b0e925-086a-4964-b8dc-4c9e58213cf5",
- "subject": "Note 1",
- "updated": 1564646618.556,
- "updatedBy": "example@example.com",
- "userId": 11405
}
You can delete a note. This operation is irreversible.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: NOTES_SERVICE_NOTE_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: CLIENT_NOTES
clientId required | integer <int64> Profile ID |
noteId required | string Note UUID |
curl --request DELETE --url https://api.synerise.com/notes-service/by-id/%7BclientId%7D/%7BnoteId%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_'
Log out a Profile when authenticated as a Synerise User or a Workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: SAUTH_LOGOUT_CLIENT_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: SETTINGS_CUSTOMERS_IAM
clientID required | string Example: 434428563 The ID of the Profile |
action | string Enum: "LOGOUT" "LOGOUT_WITH_SESSION_CLEARING" |
{- "action": "LOGOUT"
}
{- "error": "string",
- "message": "string",
- "errors": [
- {
- "code": 0,
- "field": "string",
- "message": "string",
- "rejectedValue": "string"
}
], - "status": 0,
- "timestamp": "string",
- "path": "string",
- "traceId": "string"
}
Create your own indicators based on mathematical formulas or calculations for profiles and events and use them as derived attributes
Retrieve a list of all expressions in the workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_LIST_EXPRESSION_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission groups which allow access to this method: ANALYTICS, CLIENT_ANALYTICS_PREVIEW
filter | string Default: "NONE" Enum: "NONE" "CLIENT" "EVENT" You can filter the results by expression type. NONE equals to "no filter". |
offset | integer <int64> Offset for pagination. The first item of the first page has the offset of |
page | integer <int32> The number of the page to retrieve. The first page has the index |
size | integer <int32> Default: 20 The size of a page. The indexes of the retrieved items are calculated from this parameter and the page number sent in |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions?filter=SOME_STRING_VALUE&offset=SOME_INTEGER_VALUE&page=SOME_INTEGER_VALUE&size=SOME_INTEGER_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "content": [
- {
- "id": "497f6eca-6276-4993-bfeb-53cbbbba6f08",
- "payload": {
- "analysis": {
- "description": "string",
- "name": "string",
- "type": "EVENT",
- "expression": {
- "type": "FUNCTION",
- "function": "BRACKET",
- "arg": {
- "type": "VALUE",
- "value": {
- "type": "EVENT",
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "title": "string"
}
}
}, - "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0
}, - "createdBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "isDynamicAnalytic": true,
- "isPredefinedAnalytic": true,
- "isVisibleForClientProfile": true,
- "modifiedBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "analyticVersion": "b7fef916-6206-4574-baf5-7763ce0ade4d"
}
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Create a new expression.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
required | Event expression (object) or Profile attribute expression (object) (Expression) Structure of the analysis |
isVisibleForClientProfile required | boolean When set to |
{- "analysis": {
- "description": "string",
- "name": "string",
- "type": "EVENT",
- "expression": {
- "type": "FUNCTION",
- "function": "BRACKET",
- "arg": {
- "type": "VALUE",
- "value": {
- "type": "EVENT",
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "title": "string"
}
}
}, - "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0
}, - "isVisibleForClientProfile": true
}
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Delete a number of expressions. This operation is irreversible.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
ids required | string <uuid> A list of expressions to delete, identified by UUID |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request DELETE --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions?ids=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Retrieve a list of expressions that include a specified string in the title. Note that this is a POST
request.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
offset | integer <int64> Offset for pagination. The first item of the first page has the offset of |
page | integer <int32> The number of the page to retrieve. The first page has the index |
size | integer <int32> Default: 20 The size of a page. The indexes of the retrieved items are calculated from this parameter and the page number sent in |
Content-Type required | string Value: "application/json" Mandatory header |
title required | string A string to search for in the titles of analytics |
{- "title": "string"
}
{- "content": [
- {
- "id": "497f6eca-6276-4993-bfeb-53cbbbba6f08",
- "payload": {
- "analysis": {
- "description": "string",
- "name": "string",
- "type": "EVENT",
- "expression": {
- "type": "FUNCTION",
- "function": "BRACKET",
- "arg": {
- "type": "VALUE",
- "value": {
- "type": "EVENT",
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "title": "string"
}
}
}, - "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0
}, - "createdBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "isDynamicAnalytic": true,
- "isPredefinedAnalytic": true,
- "isVisibleForClientProfile": true,
- "modifiedBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "analyticVersion": "b7fef916-6206-4574-baf5-7763ce0ade4d"
}
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Retrieve a summary of all expressions in the Workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission groups which allow access to this method: ANALYTICS, CAMPAIGNS_RECOMMENDATIONS
filter | string Default: "NONE" Enum: "NONE" "CLIENT" "EVENT" You can filter the results by expression type. NONE equals to "no filter". |
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions/projections?filter=SOME_STRING_VALUE&namespaceName=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
[- {
- "createdAt": "2019-08-24T14:15:22Z",
- "hashId": "3fcea162-e397-4686-8826-987dbb8f4b18",
- "isDynamicAnalytic": true,
- "name": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
]
Retrieve the details of a single expression.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions/%7BUUID%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "id": "497f6eca-6276-4993-bfeb-53cbbbba6f08",
- "payload": {
- "analysis": {
- "description": "string",
- "name": "string",
- "type": "EVENT",
- "expression": {
- "type": "FUNCTION",
- "function": "BRACKET",
- "arg": {
- "type": "VALUE",
- "value": {
- "type": "EVENT",
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "title": "string"
}
}
}, - "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0
}, - "createdBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "isDynamicAnalytic": true,
- "isPredefinedAnalytic": true,
- "isVisibleForClientProfile": true,
- "modifiedBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "analyticVersion": "b7fef916-6206-4574-baf5-7763ce0ade4d"
}
}
Update an existing expression.
WARNING: The analysis
object sent in this call overwrites the existing one. Any values (including params and filters) that are not included in the request body are deleted or set to default values.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
required | Event expression (object) or Profile attribute expression (object) (Expression) Structure of the analysis |
isVisibleForClientProfile required | boolean When set to |
{- "analysis": {
- "description": "string",
- "name": "string",
- "type": "EVENT",
- "expression": {
- "type": "FUNCTION",
- "function": "BRACKET",
- "arg": {
- "type": "VALUE",
- "value": {
- "type": "EVENT",
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "title": "string"
}
}
}, - "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0
}, - "isVisibleForClientProfile": true
}
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Delete an expression. This operation is irreversible.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request DELETE --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions/%7BUUID%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Create a copy of an existing expression.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request POST --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions/%7BUUID%7D/duplicate --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Preview the result of an expression in context of a profile. This request does not save the analysis in the database.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
clientId required | integer Profile ID |
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
required | Event expression (object) or Profile attribute expression (object) (Expression) Structure of the analysis |
isVisibleForClientProfile required | boolean When set to |
{- "analysis": {
- "description": "string",
- "name": "string",
- "type": "EVENT",
- "expression": {
- "type": "FUNCTION",
- "function": "BRACKET",
- "arg": {
- "type": "VALUE",
- "value": {
- "type": "EVENT",
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "title": "string"
}
}
}, - "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0
}, - "isVisibleForClientProfile": true
}
{- "clientId": 0,
- "expressionId": "98a623dd-0690-4acb-bbad-b1eda4955cc3",
- "result": "string",
- "title": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
Calculate the results of expressions visible on a profile card.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission groups which allow access to this method: ANALYTICS, CLIENT_ANALYTICS_PREVIEW
clientId required | integer Profile ID |
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions/clients/%7BclientId%7D/calculate?namespaceName=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "content": [
- {
- "clientId": 0,
- "expressionId": "98a623dd-0690-4acb-bbad-b1eda4955cc3",
- "result": "string",
- "title": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Calculate the results of expressions visible on a profile card in context of the currently authenticated profile.
API consumer who can use this method: Profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission groups which allow access to this method: ANALYTICS, CLIENT_ANALYTICS_PREVIEW
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions/clients/calculate?namespaceName=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "content": [
- {
- "clientId": 0,
- "expressionId": "98a623dd-0690-4acb-bbad-b1eda4955cc3",
- "result": "string",
- "title": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Calculate the results of an existing expression in context of a single profile.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
clientId required | integer Profile ID |
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions/%7BUUID%7D/client/%7BclientId%7D/calculate --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "clientId": 0,
- "expressionId": "98a623dd-0690-4acb-bbad-b1eda4955cc3",
- "result": "string",
- "title": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
clientId required | integer Profile ID |
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
Absolute (object) or Relative to current (object) or Relative/patterned (object) or Absolute/patterned (object) Details of the date filter. The analysis results are calculated from data that matches the filter. | |
object This object defines how to aggregate the data in an analysis. | |
object Profile filter. This allows you to limit the calculation to profiles which match certain criteria. | |
Array of objects[ items ] A list of dynamically modifiable variables that occur in this analysis |
{- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "aggregateDataBy": {
- "type": "YEARS",
- "value": 0
}, - "filter": {
- "matching": true,
- "expressions": [
- {
- "type": "ATTRIBUTE",
- "matching": true,
- "attribute": {
- "expressions": [
- {
- "constraint": {
- "type": "STRING_ONE",
- "logic": "EQUAL",
- "value": {
- "type": "CONSTANT",
- "constant": "testString"
}
}, - "attribute": {
- "type": "PARAM",
- "param": "#test"
}
}
]
}
}, - {
- "type": "OPERATOR",
- "logic": "AND"
}, - {
- "type": "ATTRIBUTE",
- "matching": true,
- "attribute": {
- "expressions": [
- {
- "constraint": {
- "type": "STRING_ARRAY",
- "logic": "NOT_IN",
- "value": {
- "type": "CONSTANT",
- "constant": [
- "testString"
]
}
}, - "attribute": {
- "type": "PARAM",
- "param": "#test2"
}
}
]
}
}
], - "expression": {
- "type": "FUNCTION",
- "function": "AND",
- "arg1": {
- "type": "string"
}, - "arg2": {
- "type": "string"
}
}
}, - "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
{- "clientId": 0,
- "expressionId": "98a623dd-0690-4acb-bbad-b1eda4955cc3",
- "result": "string",
- "title": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
Calculate the results of an expression in context of the currently authenticated profile.
API consumer who can use this method: Profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/expressions/%7BUUID%7D/client/calculate --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "clientId": 0,
- "expressionId": "98a623dd-0690-4acb-bbad-b1eda4955cc3",
- "result": "string",
- "title": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
Calculate the results of a previously defined expression with custom filters.
This operation does not modify the original expression in any way.
API consumer who can use this method: Profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_EXPRESSION_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
Absolute (object) or Relative to current (object) or Relative/patterned (object) or Absolute/patterned (object) Details of the date filter. The analysis results are calculated from data that matches the filter. | |
object This object defines how to aggregate the data in an analysis. | |
object Profile filter. This allows you to limit the calculation to profiles which match certain criteria. | |
Array of objects[ items ] A list of dynamically modifiable variables that occur in this analysis |
{- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "aggregateDataBy": {
- "type": "YEARS",
- "value": 0
}, - "filter": {
- "matching": true,
- "expressions": [
- {
- "type": "ATTRIBUTE",
- "matching": true,
- "attribute": {
- "expressions": [
- {
- "constraint": {
- "type": "STRING_ONE",
- "logic": "EQUAL",
- "value": {
- "type": "CONSTANT",
- "constant": "testString"
}
}, - "attribute": {
- "type": "PARAM",
- "param": "#test"
}
}
]
}
}, - {
- "type": "OPERATOR",
- "logic": "AND"
}, - {
- "type": "ATTRIBUTE",
- "matching": true,
- "attribute": {
- "expressions": [
- {
- "constraint": {
- "type": "STRING_ARRAY",
- "logic": "NOT_IN",
- "value": {
- "type": "CONSTANT",
- "constant": [
- "testString"
]
}
}, - "attribute": {
- "type": "PARAM",
- "param": "#test2"
}
}
]
}
}
], - "expression": {
- "type": "FUNCTION",
- "function": "AND",
- "arg1": {
- "type": "string"
}, - "arg2": {
- "type": "string"
}
}
}, - "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
{- "clientId": 0,
- "expressionId": "98a623dd-0690-4acb-bbad-b1eda4955cc3",
- "result": "string",
- "title": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
Retrieve a list of all aggregates in the Workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_LIST_AGGREGATE_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission groups which allow access to this method: ANALYTICS, CLIENT_ANALYTICS_PREVIEW
offset | integer <int64> Offset for pagination. The first item of the first page has the offset of |
page | integer <int32> The number of the page to retrieve. The first page has the index |
size | integer <int32> Default: 20 The size of a page. The indexes of the retrieved items are calculated from this parameter and the page number sent in |
sort | string Enum: "name,asc" "name,desc" "isPredefinedAnalytic,asc" "isPredefinedAnalytic,desc" "isDynamicAnalytic,asc" "isDynamicAnalytic,desc" "created,asc" "created,desc" "title,asc" "title,desc" Sorting order |
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates?offset=SOME_INTEGER_VALUE&page=SOME_INTEGER_VALUE&size=SOME_INTEGER_VALUE&sort=SOME_STRING_VALUE&namespaceName=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "content": [
- {
- "createdBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "modifiedBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "aggregate": {
- "name": "string",
- "description": "string",
- "id": "497f6eca-6276-4993-bfeb-53cbbbba6f08",
- "uuid": "095be615-a8ad-4c33-8e9c-c7612fbf6c9f",
- "actionId": 0,
- "action": {
- "name": "string",
- "id": 0
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "type": "AVG",
- "size": 0,
- "unique": false,
- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "expressions": [
- {
- "constraint": {
- "type": "NULL",
- "logic": "IS_NULL"
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}
}
], - "oldId": "string"
}, - "name": "string",
- "description": "string",
- "deleted": true,
- "isVisibleForClientProfile": true,
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "isDynamicAnalytic": true,
- "isPredefinedAnalytic": true,
- "analyticVersion": "string"
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Create a new aggregate analysis.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_CREATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
required | object (Aggregate) Structure of the analysis |
isVisibleForClientProfile required | boolean When set to |
{- "aggregate": {
- "name": "string",
- "description": "string",
- "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0,
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "type": "AVG",
- "size": 0,
- "unique": false,
- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "expressions": [
- {
- "constraint": {
- "type": "NULL",
- "logic": "IS_NULL"
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}
}
]
}, - "isVisibleForClientProfile": true
}
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Delete a number of aggregates. This operation is irreversible.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
ids required | string <uuid> A list of aggregates to delete, identified by UUID |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request DELETE --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates?ids=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Retrieve a list of aggregates that include a specified string in the title. Note that this is a POST
request.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_FILTER_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
offset | integer <int64> Offset for pagination. The first item of the first page has the offset of |
page | integer <int32> The number of the page to retrieve. The first page has the index |
size | integer <int32> Default: 20 The size of a page. The indexes of the retrieved items are calculated from this parameter and the page number sent in |
sort | string Enum: "name,asc" "name,desc" "isPredefinedAnalytic,asc" "isPredefinedAnalytic,desc" "isDynamicAnalytic,asc" "isDynamicAnalytic,desc" "created,asc" "created,desc" "title,asc" "title,desc" Sorting order |
Content-Type required | string Value: "application/json" Mandatory header |
title required | string A string to search for in the titles of analytics |
{- "title": "string"
}
{- "content": [
- {
- "createdBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "modifiedBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "aggregate": {
- "name": "string",
- "description": "string",
- "id": "497f6eca-6276-4993-bfeb-53cbbbba6f08",
- "uuid": "095be615-a8ad-4c33-8e9c-c7612fbf6c9f",
- "actionId": 0,
- "action": {
- "name": "string",
- "id": 0
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "type": "AVG",
- "size": 0,
- "unique": false,
- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "expressions": [
- {
- "constraint": {
- "type": "NULL",
- "logic": "IS_NULL"
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}
}
], - "oldId": "string"
}, - "name": "string",
- "description": "string",
- "deleted": true,
- "isVisibleForClientProfile": true,
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "isDynamicAnalytic": true,
- "isPredefinedAnalytic": true,
- "analyticVersion": "string"
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Retrieve a summary of all aggregates in the Workspace.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_PROJECTION_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission groups which allow access to this method: ANALYTICS, CAMPAIGNS_RECOMMENDATIONS
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates/projections?namespaceName=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
[- {
- "createdAt": "2019-08-24T14:15:22Z",
- "isDynamicAnalytic": true,
- "name": "string",
- "uuid": "095be615-a8ad-4c33-8e9c-c7612fbf6c9f",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "hashId": 0
}
]
Retrieve the details of a single aggregate.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates/%7BUUID%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "createdBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "modifiedBy": {
- "atTime": "2019-08-24T14:15:22Z",
- "id": "11335"
}, - "aggregate": {
- "name": "string",
- "description": "string",
- "id": "497f6eca-6276-4993-bfeb-53cbbbba6f08",
- "uuid": "095be615-a8ad-4c33-8e9c-c7612fbf6c9f",
- "actionId": 0,
- "action": {
- "name": "string",
- "id": 0
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "type": "AVG",
- "size": 0,
- "unique": false,
- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "expressions": [
- {
- "constraint": {
- "type": "NULL",
- "logic": "IS_NULL"
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}
}
], - "oldId": "string"
}, - "name": "string",
- "description": "string",
- "deleted": true,
- "isVisibleForClientProfile": true,
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "isDynamicAnalytic": true,
- "isPredefinedAnalytic": true,
- "analyticVersion": "string"
}
Update an existing aggregate.
WARNING: The aggregate
object sent in this call overwrites the existing one. Any values (including params and filters) that are not included in the request body are deleted or set to default values.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
required | object (Aggregate) Structure of the analysis |
isVisibleForClientProfile required | boolean When set to |
{- "aggregate": {
- "name": "string",
- "description": "string",
- "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0,
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "type": "AVG",
- "size": 0,
- "unique": false,
- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "expressions": [
- {
- "constraint": {
- "type": "NULL",
- "logic": "IS_NULL"
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}
}
]
}, - "isVisibleForClientProfile": true
}
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Delete an aggregate. This operation is irreversible.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_DELETE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request DELETE --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates/%7BUUID%7D --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Create a copy of an existing aggregate.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_UPDATE
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request POST --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates/%7BUUID%7D/duplicate --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "httpStatus": 0,
- "errorCode": "string",
- "message": "string",
- "timestamp": "2019-08-24T14:15:22Z",
- "traceId": "string",
- "help": "string"
}
Preview the result of an aggregate in context of a single profile. This request does not save the analysis in the database.
API consumer who can use this method: Synerise User
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
clientId required | integer Profile ID |
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
required | object (Aggregate) Structure of the analysis |
isVisibleForClientProfile required | boolean When set to |
{- "aggregate": {
- "name": "string",
- "description": "string",
- "action": {
- "name": "string",
- "id": 0
}, - "actionId": 0,
- "attribute": {
- "type": "PARAM",
- "param": "string"
}, - "type": "AVG",
- "size": 0,
- "unique": false,
- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "expressions": [
- {
- "constraint": {
- "type": "NULL",
- "logic": "IS_NULL"
}, - "attribute": {
- "type": "PARAM",
- "param": "string"
}
}
]
}, - "isVisibleForClientProfile": true
}
{- "aggregateId": "71d8973e-d665-45f6-9260-c96cc190809b",
- "aggregateUuid": "0beb7c8a-c781-42f8-b3ae-f2a33b0e6342",
- "clientId": 0,
- "title": "string",
- "result": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}
}
Calculate the results of aggregates visible on a profile card.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission groups which allow access to this method: ANALYTICS, CLIENT_ANALYTICS_PREVIEW
clientId required | integer Profile ID |
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates/clients/%7BclientId%7D/calculate?namespaceName=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "content": [
- {
- "aggregateId": "71d8973e-d665-45f6-9260-c96cc190809b",
- "aggregateUuid": "0beb7c8a-c781-42f8-b3ae-f2a33b0e6342",
- "clientId": 0,
- "title": "string",
- "result": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Calculate the results of aggregates visible on a profile card in context of the currently authenticated profile
API consumer who can use this method: Profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission groups which allow access to this method: ANALYTICS, CLIENT_ANALYTICS_PREVIEW
namespaceName | string Currently unused |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request GET --url 'https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates/clients/calculate?namespaceName=SOME_STRING_VALUE' --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "content": [
- {
- "aggregateId": "71d8973e-d665-45f6-9260-c96cc190809b",
- "aggregateUuid": "0beb7c8a-c781-42f8-b3ae-f2a33b0e6342",
- "clientId": 0,
- "title": "string",
- "result": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}
}
], - "pagination": {
- "currentPageNumber": 0,
- "pageSize": 0,
- "sorted": true,
- "totalElements": 0,
- "totalPages": 0
}
}
Calculate the results of an existing aggregate in context of a single profile.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
clientId required | integer Profile ID |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request POST --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates/%7BUUID%7D/client/%7BclientId%7D/calculate --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "aggregateId": "71d8973e-d665-45f6-9260-c96cc190809b",
- "aggregateUuid": "0beb7c8a-c781-42f8-b3ae-f2a33b0e6342",
- "clientId": 0,
- "title": "string",
- "result": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}
}
Calculate the results of an aggregate in context of a single profile. The results can be date-filtered and aggregated in time periods.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_HISTOGRAM_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
clientId required | integer Profile ID |
Content-Type required | string Value: "application/json" Mandatory header |
Array of objects[ items ] A list of dynamically modifiable variables that occur in this analysis | |
Absolute (object) or Relative to current (object) or Relative/patterned (object) or Absolute/patterned (object) Details of the date filter. The analysis results are calculated from data that matches the filter. | |
object This object defines how to aggregate the data in an analysis. |
{- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "aggregateDataBy": {
- "type": "YEARS",
- "value": 0
}
}
{- "items": [
- {
- "aggregateTimeDescription": "string",
- "values": [
- {
- "uuid": "095be615-a8ad-4c33-8e9c-c7612fbf6c9f",
- "value": 0
}
]
}
], - "metadata": {
- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "period": {
- "type": "YEARS",
- "value": 0
}
}
}
Calculate the results of an aggregate in context of the currently authenticated profile. The results can be date-filtered and aggregated in time periods.
API consumer who can use this method: Profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_HISTOGRAM_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
Array of objects[ items ] A list of dynamically modifiable variables that occur in this analysis | |
Absolute (object) or Relative to current (object) or Relative/patterned (object) or Absolute/patterned (object) Details of the date filter. The analysis results are calculated from data that matches the filter. | |
object This object defines how to aggregate the data in an analysis. |
{- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "aggregateDataBy": {
- "type": "YEARS",
- "value": 0
}
}
{- "items": [
- {
- "aggregateTimeDescription": "string",
- "values": [
- {
- "uuid": "095be615-a8ad-4c33-8e9c-c7612fbf6c9f",
- "value": 0
}
]
}
], - "metadata": {
- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "period": {
- "type": "YEARS",
- "value": 0
}
}
}
In context of a single profile, calculate the results of a previously defined aggregate with custom filters.
This operation does not modify the original aggregate in any way.
API consumers who can use this method: Synerise User, Workspace (formerly Business Profile)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
clientId required | integer Profile ID |
Content-Type required | string Value: "application/json" Mandatory header |
Absolute (object) or Relative to current (object) or Relative/patterned (object) or Absolute/patterned (object) Details of the date filter. The analysis results are calculated from data that matches the filter. | |
object This object defines how to aggregate the data in an analysis. | |
object Profile filter. This allows you to limit the calculation to profiles which match certain criteria. | |
Array of objects[ items ] A list of dynamically modifiable variables that occur in this analysis |
{- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "aggregateDataBy": {
- "type": "YEARS",
- "value": 0
}, - "filter": {
- "matching": true,
- "expressions": [
- {
- "type": "ATTRIBUTE",
- "matching": true,
- "attribute": {
- "expressions": [
- {
- "constraint": {
- "type": "STRING_ONE",
- "logic": "EQUAL",
- "value": {
- "type": "CONSTANT",
- "constant": "testString"
}
}, - "attribute": {
- "type": "PARAM",
- "param": "#test"
}
}
]
}
}, - {
- "type": "OPERATOR",
- "logic": "AND"
}, - {
- "type": "ATTRIBUTE",
- "matching": true,
- "attribute": {
- "expressions": [
- {
- "constraint": {
- "type": "STRING_ARRAY",
- "logic": "NOT_IN",
- "value": {
- "type": "CONSTANT",
- "constant": [
- "testString"
]
}
}, - "attribute": {
- "type": "PARAM",
- "param": "#test2"
}
}
]
}
}
], - "expression": {
- "type": "FUNCTION",
- "function": "AND",
- "arg1": {
- "type": "string"
}, - "arg2": {
- "type": "string"
}
}
}, - "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
{- "aggregateId": "71d8973e-d665-45f6-9260-c96cc190809b",
- "aggregateUuid": "0beb7c8a-c781-42f8-b3ae-f2a33b0e6342",
- "clientId": 0,
- "title": "string",
- "result": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}
}
Calculate the results of an aggregate in context of the currently authenticated profile.
API consumer who can use this method: Profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
curl --request POST --url https://api.synerise.com/analytics-backend/analytics/definitions-manager/aggregates/%7BUUID%7D/client/calculate --header 'Authorization: Bearer _YOUR_JWT_TOKEN_' --header 'Content-Type: SOME_STRING_VALUE'
{- "aggregateId": "71d8973e-d665-45f6-9260-c96cc190809b",
- "aggregateUuid": "0beb7c8a-c781-42f8-b3ae-f2a33b0e6342",
- "clientId": 0,
- "title": "string",
- "result": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}
}
Calculate the results of a previously defined aggregate with custom filters.
This operation does not modify the original aggregate in any way.
API consumer who can use this method: Profile (formerly client)
API key Permissions are assigned to API keys (for Profile and Workspace scopes) and dictate which operations are available when using a particular API key. In the application, you can manage those permissions in Settings > API Keys. Remember that Profile and Workspace API keys are separate entities.permission required: ANALYTICS_BACKEND_AGGREGATE_FOR_CLIENT_READ
User permissions are grouped and assigned to user roles. For each group, you can set separate permissions for the following operations: read, execute, create, edit, delete. In the application, they are available in Settings > Roles. To edit a role's permissions, hover over the role and click the "Permissions" button.User role permission group which allows access to this method: ANALYTICS
UUID required | string <uuid> UUID of the analysis |
Content-Type required | string Value: "application/json" Mandatory header |
Absolute (object) or Relative to current (object) or Relative/patterned (object) or Absolute/patterned (object) Details of the date filter. The analysis results are calculated from data that matches the filter. | |
object This object defines how to aggregate the data in an analysis. | |
object Profile filter. This allows you to limit the calculation to profiles which match certain criteria. | |
Array of objects[ items ] A list of dynamically modifiable variables that occur in this analysis |
{- "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}, - "aggregateDataBy": {
- "type": "YEARS",
- "value": 0
}, - "filter": {
- "matching": true,
- "expressions": [
- {
- "type": "ATTRIBUTE",
- "matching": true,
- "attribute": {
- "expressions": [
- {
- "constraint": {
- "type": "STRING_ONE",
- "logic": "EQUAL",
- "value": {
- "type": "CONSTANT",
- "constant": "testString"
}
}, - "attribute": {
- "type": "PARAM",
- "param": "#test"
}
}
]
}
}, - {
- "type": "OPERATOR",
- "logic": "AND"
}, - {
- "type": "ATTRIBUTE",
- "matching": true,
- "attribute": {
- "expressions": [
- {
- "constraint": {
- "type": "STRING_ARRAY",
- "logic": "NOT_IN",
- "value": {
- "type": "CONSTANT",
- "constant": [
- "testString"
]
}
}, - "attribute": {
- "type": "PARAM",
- "param": "#test2"
}
}
]
}
}
], - "expression": {
- "type": "FUNCTION",
- "function": "AND",
- "arg1": {
- "type": "string"
}, - "arg2": {
- "type": "string"
}
}
}, - "variables": [
- {
- "name": "string",
- "value": "string"
}
]
}
{- "aggregateId": "71d8973e-d665-45f6-9260-c96cc190809b",
- "aggregateUuid": "0beb7c8a-c781-42f8-b3ae-f2a33b0e6342",
- "clientId": 0,
- "title": "string",
- "result": "string",
- "variables": [
- {
- "name": "string",
- "value": "string"
}
], - "dateFilter": {
- "type": "ABSOLUTE",
- "from": "2019-08-24T14:15:22Z",
- "to": "2019-08-24T14:15:22Z"
}
}