Vue d'ensemble
AdGuard DNS fournit une API REST que vous pouvez utiliser pour y intégrer vos applications.
Authentification
API keys
When included in the request header, API keys can be used to authorize requests to User API.
Request example
$ curl 'https://api.adguard-dns.io/oapi/v1/devices' -i -X GET \
-H 'Authorization: ApiKey {api_key}'
Generating API keys
To issue or revoke API keys, go to the corresponding subsection of User preferences.
Access tokens
When included in the request header, access tokens can be used to authorize requests to User API.
Request example
$ curl 'https://api.adguard-dns.io/oapi/v1/devices' -i -X GET \
-H 'Authorization: Bearer {access_token}'
Exemple de réponse
Make a POST request for the following URL with the given params to generate the access_token:
https://api.adguard-dns.io/oapi/v1/oauth_token
| Paramètre | Description |
|---|---|
| username | E-mail du compte |
| password | Mot de passe du compte |
| mfa_token | Jeton d'authentification à deux facteurs (si activé dans les paramètres du compte) |
In the response, you will get both access_token and refresh_token.
Le
access_tokenexpirera après un certain nombre de secondes spécifiées (représentées par le paramètreexpires_indans la réponse). You can regenerate a newaccess_tokenusing therefresh_token(Refer toGenerating access tokens from refresh tokens).Le
refresh_tokenest permanent. To revoke arefresh_token, refer toRevoking refresh tokens.
Request example
$ curl 'https://api.adguard-dns.io/oapi/v1/oauth_token' -i -X POST \
-H 'Content-Type: application/x-www-form-urlencoded' \
-d 'username=user%40adguard.com' \
-d 'password=********' \
-d 'mfa_token=727810'
Response example
{
"access_token": "jTFho_aymtN20pZR5RRSQAzd81I",
"token_type": "bearer",
"refresh_token": "H3SW6YFJ-tOPe0FQCM1Jd6VnMiA",
"expires_in": 2620978
}
Generating access tokens from refresh tokens
Access tokens have limited validity. Once it expires, your app will have to use the refresh token to request for a new access token.
Make the following POST request with the given params to get a new access token:
https://api.adguard-dns.io/oapi/v1/oauth_token
| Paramètre | Description |
|---|---|
| refresh_token | JETON D'ACTUALISATION à l'aide duquel un nouveau jeton d'accès doit être généré. |
Request example
$ curl 'https://api.adguard-dns.io/oapi/v1/oauth_token' -i -X POST \
-H 'Content-Type: application/x-www-form-urlencoded' \
-d 'refresh_token=H3SW6YFJ-tOPe0FQCM1Jd6VnMiA'
Response example
{
"access_token": "xQnT7GYT6Ag--3oY_EcOOdXe-I0",
"token_type": "bearer",
"refresh_token": "H3SW6YFJ-tOPe0FQCM1Jd6VnMiA",
"expires_in": 2627999
}
Revoking refresh tokens
To revoke a refresh token, make the following POST request with the given params:
https://api.adguard-dns.io/oapi/v1/revoke_token
Request example
$ curl 'https://api.adguard-dns.io/oapi/v1/revoke_token' -i -X POST \
-d 'token=H3SW6YFJ-tOPe0FQCM1Jd6VnMiA'
| Paramètre | Description |
|---|---|
| refresh_token | REFRESH TOKEN qui doit être révoqué |
Authorization endpoint
To access this endpoint, you need to contact us at devteam@adguard.com. Please describe the reason and use cases for this endpoint, as well as provide the redirect URI. Upon approval, you will receive a unique client identifier, which should be used for the client_id parameter.
The /oapi/v1/oauth_authorize endpoint is used to interact with the resource owner and get the authorization to access the protected resource.
The service redirects you to AdGuard to authenticate (if you are not already logged in) and then back to your application.
The request parameters of the /oapi/v1/oauth_authorize endpoint are:
| Paramètre | Description |
|---|---|
| response_type | Indique au serveur d'autorisation quel autoriser exécuter |
| client_id | L'ID du client OAuth qui demande une autorisation |
| redirect_uri | Contient une URL. Une réponse réussie de ce point de terminaison entraîne une redirection vers cette URL |
| state | Une valeur opaque utilisée à des fins de sécurité. Si ce paramètre de requête est défini dans la requête, il est renvoyé à l'application dans le cadre de l'redirect_uri |
| aid | Identifiant de l'affilié |
Par exemple :
https://api.adguard-dns.io/oapi/v1/oauth_authorize?response_type=token&client_id=CLIENT_ID&redirect_uri=REDIRECT_URI&state=1jbmuc0m9WTr1T6dOO82
To inform the authorization server which grant type to use, the response_type request parameter is used as follows:
- Pour l'autorisation implicite, utilisez response_type=token pour inclure un jeton d'accès.
A successful response is 302 Found, which triggers a redirect to redirect_uri (which is a request parameter). The response parameters are embedded in the fragment component (the part after the # symbol) of the redirect_uri in the Location header.
Par exemple :
HTTP/1.1 302 Found
Location: REDIRECT_URI#access_token=...&token_type=Bearer&expires_in=3600&state=1jbmuc0m9WTr1T6dOO82
API
Référence
Please see the method’s reference.
OpenAPI spec
OpenAPI specification is available at https://api.adguard-dns.io/swagger/openapi.json.
You can use different tools to view the list of available API methods. For instance, you can open this file in https://editor.swagger.io/.
Journal des modifications
The complete AdGuard DNS API changelog is available on this page.
Commentaires
If you would like this API to be extended with new methods, please email us to devteam@adguard.com and let us know what you would like to be added.