Menu

Tree [1adff8] master v3.0.5-8 /
 History

HTTPS access


File Date Author Commit
 api 2018-01-18 John Scherff John Scherff [017b74] Fixed numerous issues with v2 audit handler
 bcrypt 2018-01-26 John Scherff John Scherff [d1f19c] cmdbd version 3.0.5 release 7
 config 2018-01-18 John Scherff John Scherff [017b74] Fixed numerous issues with v2 audit handler
 deploy 2018-01-26 John Scherff John Scherff [1adff8] cmdbd version 3.0.5 release 8
 model 2018-01-18 John Scherff John Scherff [017b74] Fixed numerous issues with v2 audit handler
 server 2018-01-18 John Scherff John Scherff [017b74] Fixed numerous issues with v2 audit handler
 service 2018-01-12 John Scherff John Scherff [a53c9a] Refactored model again
 store 2018-01-11 John Scherff John Scherff [1f7c39] Refactored DataStore
 utils 2018-01-09 John Scherff John Scherff [4688a3] Added unique/duplicate check for new SNs
 .gitattributes 2017-09-29 John Scherff John Scherff [39a48b] Added .gitattributes file to prevent linguist f...
 .gitignore 2018-01-26 John Scherff John Scherff [a7bbc9] Cleaned up .gitignore files and tweaked RPM spe...
 LICENSE 2018-01-16 John Scherff John Scherff [6dc7e0] Rearranging files, removed bcrypt
 README.md 2018-01-26 John Scherff John Scherff [62d1d4] Separated DDL and DML, modified RPM spec file a...
 TODO.md 2018-01-26 John Scherff John Scherff [a7bbc9] Cleaned up .gitignore files and tweaked RPM spe...
 flags.go 2017-10-19 John Scherff John Scherff [99e2d6] Minor bug fix
 main.go 2018-01-08 John Scherff John Scherff [703280] Numerous bug fixes

Read Me

CMDBd

The Configuration Management Database Daemon is a lightweight HTTP server that provides a RESTful JSON API for workstations to register and manage information about attached devices. The Configuration Management Database Client or CMDBc is the complementary component that collects configuration information for attached devices and reports that information to the server for storage in the database. CMDBc can register or "check-in" attached devices with the server, obtain unique serial numbers from the server for devices that support serial number configuration, perform audits against previous device configurations, and report configuration changes found during the audit to the server for logging and analysis. CMDBd stores the information in a back-end database.

System Requirements

CMDBd is written in Go and can be compiled for any operating system and architecture. This document assumes CMDBd will be installed on Red Hat Enterprise Linux or CentOS Release 7 -- or an equivalent operating system that supports RPM package management and uses SystemD initialization. It requires MySQL 5.7 or MariaDB 10.2 or higher for the back-end database.

Installation

You can build the RPM package with only the RPM spec file, cmdbd.spec, using the following commands:

wget https://raw.githubusercontent.com/jscherff/cmdbd/master/rpm/cmdbd.spec
rpmbuild -bb --clean cmdbd.spec

You will need to install the git, golang, libusbx, libusbx-devel, and rpm-build packages (and their dependencies) in order to perform the build. Once you've built the RPM, you can install it with the RPM command. If you're installing the package for the first time, use the -i (install) flag to install the package:

rpm -i ${HOME}/rpmbuild/RPMS/{arch}/cmdbd-{version}-{release}.{arch}.rpm

If you're upgrading the package to a newer version, use the -U (upgrade) flag to upgrade the package:

rpm -U ${HOME}/rpmbuild/RPMS/{arch}/cmdbd-{version}-{release}.{arch}.rpm

In the above examples, {arch} is the system architecture (e.g. x86_64), {version} is the package version, (e.g. 1.0.0), and {release} is the package release (e.g. 1.el7.centos).

The package will install the following files:
* /usr/sbin/cmdbd is the CMDB daemon.
* /usr/bin/bcrypt is a utility for generating password hashes.
* /etc/cmdbd/config.json is the master configuration file.
* /etc/cmdbd/store/mysql.json contains settings for the datastore.
* /etc/cmdbd/model/queries.json contains SQL queries used by the model.
* /etc/cmdbd/server/httpd.json contains settings for the HTTP daemon.
* /etc/cmdbd/server/router.json contains settings for the HTTP mux router.
* /etc/cmdbd/server/syslog.json contains settings for communicating with a syslog daemon.
* /etc/cmdbd/service/auth.json contains settings for the authentication and authorization service.
* /etc/cmdbd/service/metausb.json contains settings for the USB metadata service.
* /etc/cmdbd/service/serial.json contains settings for the serial number generator service.
* /etc/cmdbd/service/logger.json contains settings for the logger service.
* /etc/cmdbd/service/prikey.pem is the private key used by the authentication service.
* /etc/cmdbd/service/pubkey.pem is the public key used by the authentication service.
* /etc/cmdbd/metausb.json contains information about known USB devices.
* /usr/lib/systemd/system/cmdbd.service is the SystemD service configuration.
* /usr/share/doc/cmdbd-x.y.z/LICENSE is the Apache 2.0 license.
* /usr/share/doc/cmdbd-x.y.z/README.md is this documentation file.
* /usr/share/doc/cmdbd-x.y.z/cmdbd.sql creates the application datastore.
* /usr/share/doc/cmdbd-x.y.z/reset.sql truncates all tables in the datastore.
* /var/log/cmdbd is the directory where CMDBd writes its log files.

Once the package is installed, you must create the database schema, objects, and user account on the target database server using the provided SQL, cmdbd.sql and users.sql. You must also modify mysql.json configuration file to reflect the correct database hostname, port, user, and password; modify httpd.json to reflect the desired application listener port; and modify other configuration files as necessary and as desired (see below). By default, the config files are owned by the daemon user account and are not 'world-readable' as they contain potentially sensitive information. You should not relax the permissions mode of these files.

Configuration

The JSON configuration files are mostly self-explanatory. The default settings are sane and you should not have to change them in most use cases.

Master Config (config.json)

The master configuration file contains global parameters and file names of other configuration files.

{
    "Console": false,
    "Refresh": false,

    "ConfigFile": {
        "Server": "server/httpd.json",
        "Router": "server/router.json",
        "Syslog": "server/syslog.json",
        "AuthSvc": "service/auth.json",
        "LoggerSvc": "service/logger.json",
        "SerialSvc": "service/serial.json",
        "MetaUsbSvc": "service/metausb.json",
        "DataStore": "store/mysql.json",
        "Queries": "model/queries.json"
    }
}
  • Console causes log output to be written to the console in addition to other destinations.
  • Refresh causes metadata files and datastores to be refreshed from source, where applicable.
  • ConfigFile specifies configuration filenames for other components of the application. These components and their configuration settings are covered in more detail later in this document. All paths are relative to the directory of the master configuration file, config.json.
    • Server names the file that contains settings for the HTTP daemon.
    • Router names the file that contains settings for the HTTP mux router.
    • Syslog names the file that contains settings for communicating with a syslog daemon.
    • AuthSvc names the configuration file for the Authentication and Authorization Service.
    • LoggerSvc names the configuration file for the Logger Service.
    • SerialSvc names the configuration file for the serial number generator service.
    • MetaUsbSvc names the configuration file for the USB metadata service.
    • DataStore names the configuration file for the application datastore.
    • Queries names the file containing the SQL queries used by the model.

HTTP Daemon Settings (server/httpd.json)

The server configuration file contains parameters for the HTTP server:

{
    "Addr": ":8080",
    "ReadTimeout": 10,
    "WriteTimeout": 10,
    "MaxHeaderBytes": 1048576
}
  • Addr is the hostname (or IP address) and port of the listener, separated by a colon. If the hostname/address component is blank, the daemon will listen on all network interfaces.
  • ReadTimeout is the maximum duration in seconds for reading the entire HTTP request, including the body.
  • WriteTimeout is the maximum duration in seconds before timing out writes of the response.
  • MaxHeaderBytes is the maximum size in bytes of the request header.

HTTP Mux Router Settings (server/router.json)

Contains parameters for the HTTP mux router and recovery handler:

{
        "RecoveryStack": true
}
  • RecoveryStack enables or suppresses writing of the stack track to the error log on panic conditions.

Syslog Daemon Settings (server/syslog.json)

The syslog configuration file contains parameters for communicating with an optional local or remote syslog server:

{
    "Enabled": false,
    "Protocol": "tcp",
    "Port": "1468",
    "Host": "localhost",
    "Tag": "cmdbd",
    "Facility": "LOG_LOCAL7",
    "Severity": "LOG_INFO"
}
  • Enabled controls whether or not the syslog client is enabled.
  • Protocol is the transport-layer protocol used by the syslog daemon (blank for local).
  • Port is the port used by the syslog daemon (blank for local).
  • Host is the hostname or IP address of the syslog daemon (blank for local).
  • Tag is an arbitrary string to add to the event.
  • Facility specifies the type of program that is logging the message (see RFC 5424):
    • LOG_KERN -- kernel messages
    • LOG_USER -- user-level messages
    • LOG_MAIL -- mail system
    • LOG_DAEMON -- system daemons
    • LOG_AUTH -- security/authorization messages
    • LOG_SYSLOG -- messages generated internally by syslogd
    • LOG_LPR -- line printer subsystem
    • LOG_NEWS -- network news subsystem
    • LOG_UUCP -- UUCP subsystem
    • LOG_CRON -- security/authorization messages
    • LOG_AUTHPRIV -- FTP daemon
    • LOG_FTP -- scheduling daemon
    • LOG_LOCAL0 -- local use 0
    • LOG_LOCAL1 -- local use 1
    • LOG_LOCAL2 -- local use 2
    • LOG_LOCAL3 -- local use 3
    • LOG_LOCAL4 -- local use 4
    • LOG_LOCAL5 -- local use 5
    • LOG_LOCAL6 -- local use 6
    • LOG_LOCAL7 -- local use 7
  • Severity specifies the severity of the event (see RFC 5424):
    • LOG_EMERG -- system is unusable
    • LOG_ALERT -- action must be taken immediately
    • LOG_CRIT -- critical conditions
    • LOG_ERR -- error conditions
    • LOG_WARNING -- warning conditions
    • LOG_NOTICE -- normal but significant conditions
    • LOG_INFO -- informational messages
    • LOG_DEBUG -- debug-level messages

Authentication and Authorization Service Settings (service/auth.json)

The authentication and authorization file contains parameters required for the server to authenticate users and determine which endpoints authenticated users may access.

{
        "AuthMaxAge": 60,
        "PubKeyFile": "pubkey.pem",
        "PriKeyFile": "prikey.pem"
}
  • AuthMaxAge is the maximum amount of time in minutes that an authentication token is valid.
  • PubKeyFile is the filename of the public key used in generating authentication tokens.
  • PriKeyFile is the filename of the private key used in generating authentication tokens.

Logger Service Settings (service/logger.json)

The logger configuration file contains parameters that determine log file names and logging behavior:

{
    "LogDir": "/var/log/cmdbd",
    "Stdout": false,
    "Stderr": false,
    "Syslog": false,

    "Logger": {

        "System": {
            "Tag": "System",
            "Stdout": false,
            "Stderr": false,
            "Syslog": false
            "LogFile": "system.log",
            "LogFlags": ["date","time","shortfile"],
        },

        "Access": {
            "Tag": "Access",
            "Stdout": false,
            "Stderr": false,
            "Syslog": false,
            "LogFile": "access.log",
            "LogFlags": []
        },

        "Error": {
            "Tag": "Error",
            "Stdout": false,
            "Stderr": false,
            "Syslog": false,
            "LogFile": "error.log",
            "LogFlags": ["date","time","longfile"]
        }
    }
}
  • LogDir is the directory where all log files are written.
  • Stdout causes the daemon to write log entries to standard output (console) in addition to other destinations. This overrides the same setting for individual logs, below.
  • Stderr causes the daemon to write log entries to standard error in addition to other destinations. This overrides the same setting for individual logs, below.
  • Syslog causes the daemon to write log entries to a local or remote syslog daemon using the syslog configuration settings, above. This overrides the same setting for individual logs, below.
  • Logger describes each log used by the application. Each log has the following settings:
    • Tag is the prefix of each entry in the log.
    • Stdout causes the daemon to write log entries to standard output (console) in addition to other destinations.
    • Stderr causes the daemon to write log entries to standard error in addition to other destinations.
    • Syslog causes the daemon to write log entries to a local or remote syslog daemon using the syslog configuration settings, above.
    • LogFile is the filename of the log file.
    • LogFlags is a comma-separated list of attributes to include in the prefix of each log entry. If it is empty, log entries will have no prefix. (This is appropriate for the HTTP access log which is written in the Apache combined log format and already includes relevent attributes in the prefix.) The following [case-sensitive] flags are supported:
      • date includes date of the event in YYYY/MM/DD format.
      • time includes local time of the event in HH:MM:SS 24-hour clock format.
      • utc includes time in UTC rather than local time.
      • standard is shorthand for date and time.
      • longfile includes the long filename of the source file of the code that generated the event.
      • shortfile includes the short filename of the source file of the code that generated the event.

Serial Number Generator Service Settings (service/serial.json)

Contains C language printf-style format strings for generating serial numbers from a seed integer. Serial number formats can be customized for specific device types.

{
    "SerialFormat": {
        "*usb.Magtek": "24HF%04XMT",
        "*usb.IDTech": "24HF%04XIT",
        "*usbci.Magtek": "24HF%04XMT",
        "Default": "24HF%06X"
    }
}
  • *<type>.<device> specifies a serial number format for the specific, named device type.
  • Default specifies the default serial number format.

USB Metadata Service Settings (service/metausb.json)

The USB metadata configuration file contains vendor names, product names, class descriptions, subclass descriptions, and protocol descriptions for known USB devices. This file is generated from information provided by http://www.linux-usb.org/usb.ids and is updated automatically from that site every 30 days. You can force a refresh of this file in two ways:
1. Execute the daemon binary, cmdbd, with the -refresh flag (preferred). This will download a fresh copy of the metadata, store it in the configuration file, and update relevant metadata tables in the database.
2. Modify the "Updated": parameter in the configuration file to a date more than 30 days prior.

    "Updated": "2017-10-17T16:54:09.4910059-07:00"

Datastore Settings (store/mysql.json)

The datastore configuration file contains parameters required for the server to authenticate and communicate with the database:

{
    "User": "cmdbd",
    "Passwd": "K2Cvg3NeyR",
    "Net": "tcp",
    "Addr": "localhost:3306",
    "DBName": "gocmdb",
    "Params": null
}
  • User is the database user the daemon uses to access the database.
  • Passwd is the database user password. Change this to a new, unique value in production.
  • Net is the port on which the database is listening. If blank, the daemon will use the MySQL default port, 3306.
  • Addr is the database hostname or IP address.
  • DBName is the database schema used by the application.
  • Params are additional parameters to pass to the driver (advanced).

Datastore Query Settings (queries.json)

The query configuration file contains SQL queries used by the model to interact with the datastore. Do not change anything in this file unless directed to do so by a qualified database administrator.

Startup

The installation package configures the daemon to start automatically when on system startup. On initial package installation, you will have to start the daemon manually because there are post-installation steps required (e.g., configuration and database setup) for the daemon to start successfully. On subssequent package upgrades, the RPM package will shutdown and restart the daemon automatically.

To start the daemon manually, use the systemctl utilty with the start command:

systemctl start cmdbd

To shut down the daemon, use the stop command:

systemctl stop cmdbd

Refer to the systemctl man page for other options, such as restart and reload.

The daemon can also be started from the command line. The following command-line options are available:
* -config specifies the master configuration file, config.json. It is located in /etc/cmdbd by default. All other configuration files will be loaded from the same location.
* -console causes all logs to be written to standard output; it overrides Stdout setting for individual logs.
* -refresh causes metadata files to be refreshed from source URLs. It overwrites both local configuration files and corresponding database tables.
* -version displays the server version, M.m.p-R, where:
* M = MAJOR version with incompatible API changes
* m = MINOR version with backwards-compatible new functionality
* p = PATCH version with backward-compatible bug fixes.
* R = RELEASE number and optional metadata (e.g., 1.beta)
* -help displays the above options with a short description.

Starting the daemon manually with console logging (using the console option flag) is good for troubleshooting. You must start the daemon in the context of the cmdbd user account or it will not be able to write to its log files:

sudo -u cmdbd /usr/sbin/cmdbd -console

You can also start the daemon directly as root:

/usr/sbin/cmdbd -console

However, doing so can hide permissions-base issues when troubleshooting. (For security reasons, the daemon should never run as root in production; it should always run in the context of a nonprivileged account.) Manual startup example:

[root@sysadm-dev-01 ~]# sudo -u cmdbd /usr/sbin/cmdbd -help
Usage of /usr/sbin/cmdbd:
  -config <file>
        Master config <file> (default "/etc/cmdbd/conf.json")
  -console
        Enable logging to console
  -refresh
        Refresh application metadata
  -version
        Display application version

[root@sysadm-dev-01 ~]# sudo -u cmdbd /usr/sbin/cmdbd -console
system 2017/10/18 19:43:39 main.go:52: Database version 10.2.9-MariaDB (cmdbd@localhost/gocmdb)
system 2017/10/18 19:43:39 main.go:53: Server version 1.1.0-6.el7.centos started and listening on ":8080"

Logging

Service access, system events, and errors are written to the following log files:
* system.log records significant, non-error events.
* access.log records client activity in Apache Combined Log Format.
* error.log records service and database errors.

Database Structure

Tables

The following tables contain USB CI (configuration item) objects and supporting elements:
* CMDB Events (cmdb_events) is not currently implemented. Future versions of CMDBd will use it for centralized event reporting.
* CMDB Sequence (cmdb_sequence) mimics a database sequence object using an auto-incremented integer column. The value of this column forms the 'seed' for dynamically-generated, unique serial numbers issued to devices without preconfigured serial numbers. The SerialFmt configuraiton setting in the master configuration file controls how the serial number is generated with this integer value. It is extremely important that this table is never altered or truncated, as it provides a guarantee against duplicate serial numbers. Even if the data in all the other tables is lost or corrupted, preserving this table preserves the unique serial number guarantee.
* CMDB Users (cmdb_users) contains users, passwords and roles used for authentication and authorizing application clients.
* Device Checkins (usbci_checkins) contains device registrations. Multiple check-ins will create multiple records. This provides the ability to track device configuration changes over time.
* Serialized Devices (usbci_serialized) contains devices with serial numbers. It is populated automatically upon device check-in. It uses a unique index based on Vendor ID, Product ID, and Serial Number, and has only one record per serialized device. The first check-in creates the record; subsequent check-ins update modified configuration settings (if any), update the record's Last Seen timestamp, and increment the record's Checkins counter.
* Unserialized Devices (usbci_unserialized) contains devices without serial numbers. It is populated automatically upon device check-in. It uses a unique index based on Hostname, Vendor ID, Product ID, Port Number, and Bus Number. It strives to have as few duplicate records as possible per unserialized device, though this cannot be guaranteed if a device is moved to a different workstation or to a different port on the same workstation. The first check-in creates the record; subsequent check-ins update modified configuration settings (if any), update the record's Last Seen timestamp, and increment the record's Checkins counter.
* Serial Number Requests (usbci_snrequests) contains requests for a new serial number. CMDBd updates new request records with the issued serial number after it is generated. Multiple requests will create multiple records. There is, however, no guarantee that the serial number configuration on the device will be successful and thus no guarantee that the device will appear in the Serialized Devices table. This provides the ability to detect failures in device serial number configuration and also detect fraudulent usage and abuse.
* Device Audits (usbci_audits) contains a history of audits for each device. Each audit that detects configuration changes creates one record, and each record contains one or more changes encapsulated in a JSON object (see below). The collection of device changes in the JSON object is expanded into individual change records in the Device Changes table. Future versions of this application may deprecate the redundant encapsulated JSON object.
* Device Changes (usbci_changes) contains a history of configuration changes for each device. Each audit that detects configuration changes creates one record for each change detected. Each change is associated with exactly one record in Device Audits; each record in Device Audits may refer to one or more changes for exactly one device.

The following tables contain USB device metadata:
* USB Vendor (usbmeta_vendor) contains USB vendor names associated with specific vendor IDs.
* USB Product (usbmeta_product) contains USB product names associated with specific vendor and product IDs.
* USB Class (usbmeta_class) contains USB class descriptions associated with specific class IDs.
* USB SubClass (usbmeta_subclass) contains USB subclass descriptions associated with specific class and subclass IDs.
* USB Protocol (usbmeta_protocol) contains USB protocol descriptions associated with specific class, subclass, and protocol IDs.

Columns

The CMDB Events table has the following columns:
* ID (id)
* Event Code (code)
* Event Source (source)
* Event Description (description)
* Host Name (host_name)
* Remote Address (remote_addr)
* Event Date (event_date)

The CMDB Users table has the following columns:
* ID (id)
* Username (user_name)
* Password (password)
* Created (created)
* Locked (locked)
* Role (role)

The CMDB Sequence table has the following columns:
* Ordinal Value (ord)
* Issue Date (issue_date)

The Device Checkins, Serialized Devices, Unserialized Devices, and Serial Number Requests tables have the following columns:
* ID (id)
* Hostname (host_name)
* Vendor ID (vendor_id)
* Product ID (product_id)
* Serial Number (serial_number)
* Vendor Name (vendor_name)
* Product Name (product_name)
* Product Version (product_ver)
* Firmware Version (firmware_ver)
* Software ID (software_id)
* Port Number (port_number)
* Bus Number (bus_number)
* Bus Address (bus_address)
* Buffer Size (buffer_size)
* Max Packet Size (max_pkt_size)
* USB Specification (usb_spec)
* USB Class (usb_class)
* USB Subclass (usb_subclass)
* USB Protocol (usb_protocol)
* Device Speed (device_speed)
* Device Version (device_ver)
* Device Serial Number (device_sn)
* Factory Serial Number (factory_sn)
* Descriptor Serial Number (descriptor_sn)
* Object Type (object_type)
* Object JSON (object_json)
* Remote Address (remote_addr)

The Device Checkins table includes the following additional column:
* Checkin Date (checkin_date)

The Serial Number Requests table includes the following additional column:
* Request Date (request_date)

The Serialized Devices and Unserialized Devices tables both include the following additional columns:
* First Seen (first_seen)
* Last Seen (last_seen)
* Checkins (checkins)

The Device Audits table has the following columns:
* ID (id)
* Vendor ID (vendor_id)
* Product ID (product_id)
* Serial Number (serial_number)
* Host Name (host_name)
* Remote Address (remote_addr)
* Changes (changes)
* Audit Date (audit_date)

For a given Device Audits record, the Changes column contains a JSON object that represents a collection of one or more changes. Each change in the collection is an array containning the following three elements:
* Property Name (element 0)
* Previous Value (element 1)
* Current Value (element 2)

The Device Changes table expands entries in Device Audits into individual configuration changes and has the following columns:
* ID (id)
* Audit ID (audit_id)
* Vendor ID (vendor_id)
* Product ID (product_id)
* Serial Number (serial_number)
* Host Name (host_name)
* Remote Address (remote_addr)
* Property Name (property_name)
* Previous Value (previous_value)
* Current Value (current_value)
* Change Date (change_date)

The USB Vendor table has the following columns:
* Vendor ID (vendor_id)
* Vendor Name (vendor_name)
* Last Update (last_update)

The USB Product table has the following columns:
* Vendor ID (vendor_id)
* Product ID (product_id)
* Product Name (product_name)
* Last Update (last_update)

The USB Class table has the following columns:
* Class ID (class_id)
* Class Description (class_desc)
* Last Update (last_update)

The USB SubClass table has the following columns:
* Class ID (class_id)
* SubClass ID (subclass_id)
* SubClass Description (subclass_desc)
* Last Update (last_update)

The USB Protocol table has the following columns:
* Class ID (class_id)
* SubClass ID (subclass_id)
* Protocol ID (protocol_id)
* Protocol Description (protocol_desc)
* Last Update (last_update)

API Endpoints, Version 1

Endpoint Method Purpose
/v1/usbci/checkin/host/vid/pid POST Submit configuration information for a new device or update information for an existing device.
/v1/usbci/checkout/host/vid/pid/sn GET Obtain configuration information for a previously-registered, serialized device in order to perform a change audit.
/v1/usbci/newsn/host/vid/pid POST Obtain a new unique serial number from the server for assignment to the attached device.
/v1/usbci/audit/host/vid/pid/sn POST Submit the results of a change audit on a serialized device. Results include the attribute name, previous value, and new value for each modified attribute.
/v1/usbmeta/vendor/vid GET Obtain the USB vendor name given the vendor ID.
/v1/usbmeta/product/vid/pid GET Obtain the USB vendor and product names given the vendor and product IDs.
/v1/usbmeta/class/cid GET Obtain the USB class description given the class ID.
/v1/usbmeta/subclass/cid/sid GET Obtain the USB class and subclass descriptions given the class and subclass IDs.
/v1/usbmeta/protocol/cid/sid/pid GET Obtain the USB class, subclass, and protocol descriptions given the class, subclass, and protocol IDs.

API Endpoints, Version 2

Endpoint Method Purpose
/v2/cmdb/authenticate GET Submit basic authentication data, username and password, to obtain authentication token.
/v2/cmdb/ci/usb/checkin/host/vid/pid POST Submit configuration information for a new device or update information for an existing device.
/v2/cmdb/ci/usb/checkout/host/vid/pid/sn GET Obtain configuration information for a previously-registered, serialized device in order to perform a change audit.
/v2/cmdb/ci/usb/newsn/host/vid/pid POST Obtain a new unique serial number from the server for assignment to the attached device.
/v2/cmdb/ci/usb/audit/host/vid/pid/sn POST Submit the results of a change audit on a serialized device. Results include the attribute name, previous value, and new value for each modified attribute.
/v2/cmdb/meta/usb/vendor/vid GET Obtain the USB vendor name given the vendor ID.
/v2/cmdb/meta/usb/vendor/vid/pid GET Obtain the USB vendor and product names given the vendor and product IDs.
/v2/cmdb/meta/usb/class/cid GET Obtain the USB class description given the class ID.
/v2/cmdb/meta/usb/subclass/cid/sid GET Obtain the USB class and subclass descriptions given the class and subclass IDs.
/v2/cmdb/meta/usb/protocol/cid/sid/pid GET Obtain the USB class, subclass, and protocol descriptions given the class, subclass, and protocol IDs.

API Parameters

  • host is the hostname of the workstation to which the device is attached.
  • vid is the vendor ID of the device.
  • pid is the product ID of the device.
  • sn is the serial number of the device.
  • vid is the vendor ID of the device.
  • pid is the product ID of the device.
  • cid is the class ID of the device.
  • sid is the subclass ID of the device.
  • pid is the protocol ID of the device.
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.