Create, delete, and rename users. List users. Reset the password, enable and disable users, configure profile settings, and much more!
Learn MoreCreate, delete, and rename Distribution and Security Groups. List groups, check if a group exists, and more!
Create, delete, and rename Organization Units (OUs). List OUs, check if the OU exists, and more!
Register, remove, and rename computers. Remove multiple computers using a wildcard, list computers, clean up inactive computers, and much more!
Learn MoreCreate and delete DNS A Records. List DNS A records with several filters.
Learn MoreCreate and delete DNS CNAME Records. List DNS CNAME records with several filters.
Learn MoreCreate and delete DNS AAAA Records. List DNS AAAA records with several filters.
Learn MoreCreate and delete DNS Lookup Zones and DNS Reverse Lookup Zones. List All DNS Zones.
Learn MoreMicrosoft Azure
Virtual Machines
Amazon Web Services (AWS) Virtual Machines
Google Cloud Platform (GCP) Virtual Machines
Oracle Cloud Infrastructure (OCI) Virtual Machines
Azure Active Directory Domain Services (Azure AD DS)
Amazon Web Services (AWS) Directory Service
GCP Managed Service for Microsoft Active Directory
VMware vSphere
Virtual Machines
There is no official Microsoft API, so if you want to automate access to the Active Directory or DNS, you must write your own API or execute PowerShell commands.
Instead of using usernames and passwords to access Active Directory or DNS, we use authentication tokens. These tokens can be used for a limited time or forever.
Every task or action executed is written in a log, so you know who and when they call any API method. Coming soon, you will be able to forward events to several SIEMs.
Create service accounts in AD, create DNS records, create AD Users, create AD Groups, create AD Organization Unit, reset AD User passwords, and more.
We have plenty of pre-configured security access groups. The API provides many options if you are a small company or a large enterprise with a dedicated security team.
Both. If you are in production, every call is secured using a token, and everything is logged. Or you can disable the token authentication if running in a test environment.
Microsoft .NET
Python
JavaScript
TypeScript
Java
Microsoft PowerShell
BASH
PHP
Go
Ruby