Build on IronWiFi
89+ REST API endpoints, OAuth2, webhooks, SCIM 2.0 provisioning, and a Terraform provider. Everything you need to automate WiFi authentication at scale.
The IronWiFi platform exposes 89+ REST API endpoints in HAL+JSON format with OAuth2 authentication. Automate user provisioning with SCIM 2.0, manage infrastructure with Terraform, and receive real-time events via webhooks. Full API documentation is available at api.ironwifi.com.
REST API
89+ endpoints covering users, organizations, RADIUS servers, networks, policies, certificates, and ITDR incidents. HAL+JSON format with HATEOAS links.
API Reference →OAuth2 Authentication
Secure API access with OAuth2 client credentials flow. Generate API keys in the console and authenticate with Bearer tokens.
Auth Guide →Webhook Events
Real-time notifications for authentication events, ITDR alerts, user changes, and policy updates. Configurable filters and retry logic.
Webhooks Docs →SCIM 2.0 Provisioning
Automated user and group sync with Okta, Microsoft Entra ID (Azure AD), Google Workspace, and any SCIM 2.0-compliant identity provider.
SCIM Guide →Terraform Provider
Manage RADIUS servers, networks, policies, users, and certificates as infrastructure as code. Available in the Terraform Registry.
Terraform Docs →SIEM Integration
Stream events to Splunk, Microsoft Sentinel, Elastic, QRadar, or Datadog via webhook or syslog in CEF format.
SIEM Guide →Quick Start: List Users via API
Authenticate with your API key and make your first request in seconds:
API Rate Limits
Rate limits are applied per API key and vary by plan tier:
| Plan | Requests / Minute | Requests / Day | Burst |
|---|---|---|---|
| Starter | 60 | 10,000 | 10 req/sec |
| Professional | 300 | 50,000 | 30 req/sec |
| Enterprise | 1,000 | Unlimited | 100 req/sec |
Rate limit headers (X-RateLimit-Remaining, X-RateLimit-Reset) are included in every response. Exceeding limits returns HTTP 429 with a Retry-After header.
Key API Resources
- Users — CRUD operations, bulk import/export, attribute management, group membership
- Organizations — multi-tenant management, settings, branding
- RADIUS Servers — server configuration, shared secrets, proxy settings
- Networks — SSID configuration, VLAN assignment, authentication policies
- Policies — conditional access rules, time-based restrictions, device filters
- Certificates — CA management, certificate issuance, revocation, SCEP configuration
- ITDR Incidents — threat detections, risk scores, response actions, timeline events
- Audit Logs — administrative actions, authentication events, policy changes
Start Building Today
Get your API key in minutes. Full documentation, code examples, and sandbox environment included with every account.
