Download OpenAPI specification:
This API is documented in Open API format v2. You can download the full API spec above, and use it with compatible code generators to generate the client stubs.
(Almost) every endpoint require a valid user authentication, so this is probably where you should start. Depending on the access rights associated with your account, some endpoints may not be authorized. When such restriction exists, the API documentation will outline which access rights are required to access or modify a given resource.
You can obtain an access token using the OAuth 2.0 Authorization Code flow with PKCE. This is a two-step process that requires browser interaction for the authorization step.
AnalyticsUI client ID from your IAM console. Login to your tenant with a tenant-admin role and navigate to the Applications section to find the client ID.https://auth.{deployment}.{domain}).https://{tenant}.{deployment}.{domain}/login).Generate the required PKCE code verifier/challenge and recommended security parameters:
# Generate code_verifier (43-128 characters, URL-safe)
CODE_VERIFIER=$(openssl rand -base64 32 | tr -d '=' | tr '/+' '_-' | cut -c1-43)
# Generate code_challenge (SHA256 hash, base64url encoded)
CODE_CHALLENGE=$(echo -n "$CODE_VERIFIER" | openssl dgst -sha256 -binary | base64 | tr -d '=' | tr '/+' '_-')
# Generate state (to prevent CSRF attacks)
STATE=$(openssl rand -base64 16 | tr -d '=' | tr '/+' '_-')
# Generate nonce (to bind client session with id_token)
NONCE=$(openssl rand -base64 16 | tr -d '=' | tr '/+' '_-')
echo "code_verifier: $CODE_VERIFIER"
echo "code_challenge: $CODE_CHALLENGE"
echo "state: $STATE"
echo "nonce: $NONCE"
Open this URL in a browser to authenticate and obtain an authorization code:
open "https://auth.{deployment}.{domain}/oauth/v2/authorize?client_id={clientId}&redirect_uri=https://{tenant}.{deployment}.{domain}/login&response_type=code&scope=openid%20profile%20email%20urn:zitadel:iam:org:projects:roles%20urn:zitadel:iam:org:project:id:zitadel:aud%20urn:zitadel:iam:user:metadata&code_challenge={code_challenge}&code_challenge_method=S256&state={state}&nonce={nonce}"
Note: The URL must be quoted and spaces in the scope must be URL-encoded as
%20.
After authenticating, you will be redirected to your callback URL with code and state parameters (e.g., https://{tenant}.{deployment}.{domain}/login?code=ABC123...&state={state}). Verify the returned state matches your original value to prevent CSRF attacks.
curl -X POST \
https://auth.{deployment}.{domain}/oauth/v2/token \
-H 'Content-Type: application/x-www-form-urlencoded' \
-d 'grant_type=authorization_code' \
-d 'client_id={clientId}' \
-d 'code={authorization_code}' \
-d 'redirect_uri=https://{tenant}.{deployment}.{domain}/login' \
-d 'code_verifier={code_verifier}'
Replace
{deployment},{domain},{clientId},{authorization_code}, and{code_verifier}with your actual values.
{
"access_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9...",
"token_type": "Bearer",
"expires_in": 43199,
"id_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9...",
"scope": "openid profile email urn:zitadel:iam:org:projects:roles urn:zitadel:iam:org:project:id:zitadel:aud urn:zitadel:iam:user:metadata"
}
Include the access token in the Authorization header for subsequent API calls:
curl -X GET \
https://{url}/api/v3/users \
-H 'Authorization: Bearer {access_token}'
You can also use an API client like Bruno to handle the OAuth 2.0 PKCE flow automatically:
Authorization Codehttps://{tenant}.{deployment}.{domain}/loginhttps://auth.{deployment}.{domain}/oauth/v2/authorizehttps://auth.{deployment}.{domain}/oauth/v2/tokenAnalyticsUI client IDurn:zitadel:iam:org:projects:roles,urn:zitadel:iam:org:project:id:zitadel:aud,urn:zitadel:iam:user:metadataOnce configured, Bruno will automatically include the access token in subsequent requests and can refresh it when needed.
Returns a signed certificate based on a client signed request provided. This API requires the tenant-admin role.
| certduration | string The certificate validity time (in hour) |
| format | string Default: "der" Enum: "der" "pem" The certificate format to be returned |
| requestedUsername | string User identity (email/username) to associate with the issued certificate. If omitted, defaults to the caller (X-Forwarded-User-Username). (this is required for CAS backward compatibility. This behavior will be removed when we retire CAS) |
| assignedRoles | Array of strings Default: "tenant-contributor" Roles to assign to the service account tied to the certificate signed and return by this request |
A client signed request as generated by openssl
For instance: openssl req -newkey rsa:2048 -nodes -keyout client.key -out client.csr
| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
{- "bodyFilters": { },
- "links": {
- "next": "${path}?page=3&pageSize=25",
- "prev": "${path}?page=1&pageSize=25",
- "self": "${path}?page=2&pageSize=25"
}, - "data": [
- {
- "expiry": 1735689600,
- "reason": "Unspecified",
- "serialNum": "291606795498498048",
- "status": "Good",
- "tenantId": "abcd12a1-1234-12ab-123a-1abcd123a1a1",
- "userId": "291606795498498048"
}
]
}| serialNum required | integer <int64> Unique Serial Number identifier of the Certificate to be returned |
{- "expiry": 1735689600,
- "reason": "Unspecified",
- "serialNum": "291606795498498048",
- "status": "Good",
- "tenantId": "abcd12a1-1234-12ab-123a-1abcd123a1a1",
- "userId": "291606795498498048"
}| serialNum required | integer <int64> Unique Serial Number identifier of the Certificate to be returned |
| reason required | string Enum: "Unspecified" "KeyCompromise" "CACompromise" "AffiliationChanged" "Superseded" "CessationOfOperation" "CertificateHold" "RemoveFromCRL" "PrivilegeWithdrawn" "AACompromise" |
{- "reason": "Unspecified"
}{- "expiry": 1735689600,
- "reason": "Unspecified",
- "serialNum": "291606795498498048",
- "status": "Good",
- "tenantId": "abcd12a1-1234-12ab-123a-1abcd123a1a1",
- "userId": "291606795498498048"
}| X-Forwarded-Tenant-Id required | string |
{- "data": {
- "attributes": [
- {
- "id": "291606795498498571",
- "isDefault": false,
- "name": "ExampleSamlIDP",
- "type": "IDENTITY_PROVIDER_TYPE_SAML"
}
]
}
}| X-Forwarded-Tenant-Id required | string |
A list of external identity provider IDs to disable
required | object |
{- "data": {
- "ids": [
- "string"
]
}
}"Forbidden"| X-Forwarded-Tenant-Id required | string |
| name required | string The name of the external identity provider. |
| metadataUrl | string The URL where the SAML metadata can be found. One of metadataUrl or metadataFile is required. |
| metadataXmlFile | string <binary> The SAML metadata XML file. One of metadataUrl or metadataFile is required. |
| isDefault | boolean Whether this SAML IdP should be set as the tenant's default IdP. Defaults to false if omitted. |
{- "id": "291606795498498571",
- "isDefault": false,
- "name": "ExampleSamlIDP",
- "type": "IDENTITY_PROVIDER_TYPE_SAML"
}| id required | string The ID of the SAML identity provider to update |
| X-Forwarded-Tenant-Id required | string |
| isDefault | boolean Whether this SAML IdP should be the tenant's default IdP. Only one default IdP is allowed per tenant. |
{- "id": "291606795498498571",
- "isDefault": false,
- "name": "ExampleSamlIDP",
- "type": "IDENTITY_PROVIDER_TYPE_SAML"
}{- "data": {
- "attributes": {
- "allowPasswordAuth": false,
- "providerLinks": [
- {
- "default": true,
- "label": "string",
- "name": "string",
- "url": "string"
}
], - "tenantId": "abcd12a1-1234-12ab-123a-1abcd123a1a1",
- "tenantName": "pca",
- "zitadelAuth": false,
- "zitadelConfig": {
- "authority": "string",
- "clients": [
- {
- "appId": "291606795498498048",
- "clientId": "291606795498498048",
- "name": "AnalyticsAppM2M"
}
], - "organizationId": "291606795498498048",
- "projects": [
- {
- "name": "Analytics",
- "projectId": "291606795498498048"
}
]
}
}, - "id": "pca",
- "type": "tenant-info"
}
}| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
| NameFilter | string Regex for custom role name filter |
| FeatureRolesFilter | string Feature role for custom role filter |
| X-Forwarded-Tenant-Id required | string |
{- "bodyFilters": { },
- "links": {
- "next": "${path}?page=3&pageSize=25",
- "prev": "${path}?page=1&pageSize=25",
- "self": "${path}?page=2&pageSize=25"
}, - "data": {
- "attributes": [
- {
- "id": "291606795498498048",
- "name": "EastCoastAccess",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}, - "roles": [
- "string"
]
}
]
}, - "meta": {
- "count": 25
}
}| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "id": "291606795498498048",
- "name": "EastCoastAccess",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}, - "roles": [
- "string"
]
}
}
}{- "data": {
- "attributes": {
- "id": "291606795498498048",
- "name": "EastCoastAccess",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}, - "roles": [
- "string"
]
}
}
}| id required | string The ID of the custom role to be returned |
| X-Forwarded-Tenant-Id required | string |
{- "data": {
- "attributes": {
- "id": "291606795498498048",
- "name": "EastCoastAccess",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}, - "roles": [
- "string"
]
}
}
}| id required | string The ID of the custom role to be updated |
| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "id": "291606795498498048",
- "name": "EastCoastAccess",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}, - "roles": [
- "string"
]
}
}
}{- "data": {
- "attributes": {
- "id": "291606795498498048",
- "name": "EastCoastAccess",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}, - "roles": [
- "string"
]
}
}
}| withPAT | boolean If set to true, a valid Personal Access Token for the service account is created and returned as well. Requires expirationDate |
| roles | Array of strings Default: "tenant-admin" The roles to assign to the service account. If not set, the default role 'tenant-admin' is assigned. Roles cannot exceed that of the caller |
| X-Forwarded-Tenant-Id required | string |
| accessTokenType required | string Default: "Bearer" Enum: "Bearer" "Jwt" |
| description | string <= 400 characters |
| expirationDate | string <date-time> |
| name required | string <= 150 characters |
| roles | Array of strings List of static roles to apply to this service account, will default to tenant-admin if none provided |
| username required | string <= 150 characters |
{- "accessTokenType": "Bearer",
- "description": "description for pca tenant",
- "expirationDate": "2021-01-01T01:00:00+00:00",
- "name": "ServiceAccount1",
- "roles": [
- "string"
], - "username": "ServiceAccount1@pca"
}{- "description": "description for service account",
- "machineUserId": "291606795498498048",
- "name": "ServiceAccount1",
- "username": "ServiceAccount1@pca",
- "pat": "string"
}| machineUserId required | string the internal machine id of the service account, |
| X-Forwarded-Tenant-Id required | string |
| X-Forwarded-User-Id | string |
{- "data": {
- "attributes": {
- "description": "description for service account",
- "machineUserId": "291606795498498048",
- "name": "ServiceAccount1",
- "username": "ServiceAccount1@pca"
}
}
}| machineUserId required | string the internal machine id of the service account, |
| X-Forwarded-Tenant-Id required | string |
| X-Forwarded-User-Id | string |
| expirationDate required | string <date-time> |
{- "expirationDate": "2021-01-01T01:00:00+00:00"
}{- "expirationDate": "2021-01-01T01:00:00+00:00",
- "key": "string",
- "keyId": "291606795498498048",
- "organizationId": "291606795498498048",
- "projectId": "291606795498498048",
- "type": "string",
- "userId": "291606795498498048"
}| machineUserId required | string The internal machine id of the service account. Using |
| credentialId required | string The credential id to delete from the service account |
| X-Forwarded-Tenant-Id required | string |
| X-Forwarded-User-Id | string |
"Bad request: invalid credential ID"| machineUserId required | string the internal machine id of the service account, |
| X-Forwarded-Tenant-Id required | string |
| X-Forwarded-User-Id | string |
| expirationDate required | string <date-time> |
{- "expirationDate": "2021-01-01T01:00:00+00:00"
}{- "credentialId": "291606795498498048",
- "expirationDate": "2021-01-01T01:00:00+00:00",
- "machineUserId": "291606795498498048",
- "pat": "ZXlKaGJHY2lPaUpTVXpJMU5pSXNJblI1Y0NJNklr..."
}| machineUserId required | string The internal machine id of the service account. Using |
| credentialId required | string The credential id to delete from the service account |
| X-Forwarded-Tenant-Id required | string |
| X-Forwarded-User-Id | string |
"Bad request: invalid credential ID"| machineUserId required | string The internal machine id of the service account. Using |
| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
| X-Forwarded-Tenant-Id required | string |
| X-Forwarded-User-Id | string |
{- "bodyFilters": { },
- "links": {
- "next": "${path}?page=3&pageSize=25",
- "prev": "${path}?page=1&pageSize=25",
- "self": "${path}?page=2&pageSize=25"
}, - "data": [
- {
- "attributes": {
- "creationDate": "2019-08-24T14:15:22Z",
- "expirationDate": "2019-08-24T14:15:22Z",
- "id": "string"
}
}
], - "meta": {
- "count": 25
}
}| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "username": {
- "value": "string"
}
}
}
}{- "bodyFilters": { },
- "links": {
- "next": "${path}?page=3&pageSize=25",
- "prev": "${path}?page=1&pageSize=25",
- "self": "${path}?page=2&pageSize=25"
}, - "data": [
- {
- "attributes": {
- "description": "description for service account",
- "machineUserId": "291606795498498048",
- "name": "ServiceAccount1",
- "username": "ServiceAccount1@pca"
}
}
]
}object (TenantInfo) |
{- "data": {
- "attributes": {
- "allowPasswordAuth": false,
- "providerLinks": [
- {
- "default": true,
- "label": "string",
- "name": "string",
- "url": "string"
}
], - "tenantId": "abcd12a1-1234-12ab-123a-1abcd123a1a1",
- "tenantName": "pca"
}, - "id": "pca",
- "type": "tenant-info"
}
}{- "data": {
- "attributes": {
- "allowPasswordAuth": false,
- "providerLinks": [
- {
- "default": true,
- "label": "string",
- "name": "string",
- "url": "string"
}
], - "tenantId": "abcd12a1-1234-12ab-123a-1abcd123a1a1",
- "tenantName": "pca"
}, - "id": "pca",
- "type": "tenant-info"
}
}| subdomain required | string Unique identifier of the Subdomain to delete the tenant mapping |
{- "data": {
- "attributes": {
- "allowPasswordAuth": false,
- "providerLinks": [
- {
- "default": true,
- "label": "string",
- "name": "string",
- "url": "string"
}
], - "tenantId": "abcd12a1-1234-12ab-123a-1abcd123a1a1",
- "tenantName": "pca"
}, - "id": "pca",
- "type": "tenant-info"
}
}| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "id": "ug_291606795498498048",
- "name": "Viewers",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}
}
}
}{- "data": {
- "attributes": {
- "id": "ug_291606795498498048",
- "name": "Viewers",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}
}
}
}| id required | string The ID of the user group to be returned |
| X-Forwarded-Tenant-Id required | string |
{- "data": {
- "attributes": {
- "id": "ug_291606795498498048",
- "name": "Viewers",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}
}
}
}| id required | string The ID of the user group to be updated |
| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "id": "ug_291606795498498048",
- "name": "Viewers",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}
}
}
}{- "data": {
- "attributes": {
- "id": "ug_291606795498498048",
- "name": "Viewers",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}
}
}
}| id required | string The ID of the user group |
| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
| X-Forwarded-Tenant-Id required | string |
{- "data": [
- {
- "attributes": {
- "details": {
- "changeDate": "2025-06-01T12:00:00.000Z",
- "creationDate": "2025-01-15T09:30:00.000Z"
}, - "displayName": "Anne-Marie O'Connor",
- "email": "user123@example.com",
- "firstName": "Anne-Marie",
- "id": "291606795498498048",
- "lastName": "O'Connor",
- "password": "P@ssw0rd!1",
- "preferredLoginName": "user123@example.com",
- "userType": "TYPE_HUMAN",
- "username": "user123@example.com"
}
}
], - "meta": {
- "count": 25
}
}| id required | string The ID of the user group |
| X-Forwarded-Tenant-Id required | string |
required | Array of objects |
{- "data": [
- {
- "id": "string"
}
]
}{- "errors": [
- {
- "id": "123456789",
- "reason": "Entity not found"
}
]
}| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "name": {
- "value": "string"
}
}
}
}{- "data": [
- {
- "attributes": {
- "id": "ug_291606795498498048",
- "name": "Viewers",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}
}
}
], - "meta": {
- "count": 25
}
}| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "details": {
- "changeDate": "2025-06-01T12:00:00.000Z",
- "creationDate": "2025-01-15T09:30:00.000Z"
}, - "displayName": "Anne-Marie O'Connor",
- "email": "user123@example.com",
- "firstName": "Anne-Marie",
- "id": "291606795498498048",
- "lastName": "O'Connor",
- "password": "P@ssw0rd!1",
- "preferredLoginName": "user123@example.com",
- "userType": "TYPE_HUMAN",
- "username": "user123@example.com"
}
}
}{- "data": {
- "attributes": {
- "details": {
- "changeDate": "2025-06-01T12:00:00.000Z",
- "creationDate": "2025-01-15T09:30:00.000Z"
}, - "displayName": "Anne-Marie O'Connor",
- "email": "user123@example.com",
- "firstName": "Anne-Marie",
- "id": "291606795498498048",
- "lastName": "O'Connor",
- "password": "P@ssw0rd!1",
- "preferredLoginName": "user123@example.com",
- "userType": "TYPE_HUMAN",
- "username": "user123@example.com"
}
}
}| id required | string The ID of the user |
| X-Forwarded-Tenant-Id required | string |
{- "data": {
- "attributes": {
- "details": {
- "changeDate": "2025-06-01T12:00:00.000Z",
- "creationDate": "2025-01-15T09:30:00.000Z"
}, - "displayName": "Anne-Marie O'Connor",
- "email": "user123@example.com",
- "firstName": "Anne-Marie",
- "id": "291606795498498048",
- "lastName": "O'Connor",
- "password": "P@ssw0rd!1",
- "preferredLoginName": "user123@example.com",
- "userType": "TYPE_HUMAN",
- "username": "user123@example.com"
}
}
}| id required | string The ID of the user |
| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "details": {
- "changeDate": "2025-06-01T12:00:00.000Z",
- "creationDate": "2025-01-15T09:30:00.000Z"
}, - "displayName": "Anne-Marie O'Connor",
- "email": "user123@example.com",
- "firstName": "Anne-Marie",
- "id": "291606795498498048",
- "lastName": "O'Connor",
- "password": "P@ssw0rd!1",
- "preferredLoginName": "user123@example.com",
- "userType": "TYPE_HUMAN",
- "username": "user123@example.com"
}
}
}{- "data": {
- "attributes": {
- "details": {
- "changeDate": "2025-06-01T12:00:00.000Z",
- "creationDate": "2025-01-15T09:30:00.000Z"
}, - "displayName": "Anne-Marie O'Connor",
- "email": "user123@example.com",
- "firstName": "Anne-Marie",
- "id": "291606795498498048",
- "lastName": "O'Connor",
- "password": "P@ssw0rd!1",
- "preferredLoginName": "user123@example.com",
- "userType": "TYPE_HUMAN",
- "username": "user123@example.com"
}
}
}| id required | string The ID of the user |
| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
| X-Forwarded-Tenant-Id required | string |
{- "data": [
- {
- "attributes": {
- "id": "ug_291606795498498048",
- "name": "Viewers",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}
}
}
], - "meta": {
- "count": 25
}
}| id required | string The ID of the user |
| X-Forwarded-Tenant-Id required | string |
{- "data": {
- "attributes": [
- {
- "id": "291606795498498571",
- "isDefault": false,
- "name": "ExampleSamlIDP",
- "type": "IDENTITY_PROVIDER_TYPE_SAML"
}
]
}
}| id required | string The ID of the user |
| X-Forwarded-Tenant-Id required | string |
A list of external identity provider IDs to associate to the specified user
required | object |
{- "data": {
- "ids": [
- "string"
]
}
}{- "data": {
- "attributes": [
- {
- "id": "291606795498498571",
- "isDefault": false,
- "name": "ExampleSamlIDP",
- "type": "IDENTITY_PROVIDER_TYPE_SAML"
}
]
}
}| id required | string The ID of the user |
| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
| X-Forwarded-Tenant-Id required | string |
{- "data": {
- "attributes": [
- {
- "id": "291606795498498048",
- "name": "EastCoastAccess",
- "permissions": {
- "property1": [
- "string"
], - "property2": [
- "string"
]
}, - "roles": [
- "string"
]
}
]
}, - "meta": {
- "count": 25
}
}| id required | string The ID of the user |
| X-Forwarded-Tenant-Id required | string |
required | Array of objects |
{- "data": [
- {
- "id": "string"
}
]
}{- "errors": [
- {
- "id": "123456789",
- "reason": "Entity not found"
}
]
}| page | integer >= 1 The page index of the returned results. |
| pageSize | integer >= 1 The maximum number of results to return on a page. |
| X-Forwarded-Tenant-Id required | string |
required | object |
{- "data": {
- "attributes": {
- "displayName": {
- "value": "string"
}, - "email": {
- "value": "string"
}, - "firstName": {
- "value": "string"
}, - "lastName": {
- "value": "string"
}
}
}
}{- "data": [
- {
- "attributes": {
- "details": {
- "changeDate": "2025-06-01T12:00:00.000Z",
- "creationDate": "2025-01-15T09:30:00.000Z"
}, - "displayName": "Anne-Marie O'Connor",
- "email": "user123@example.com",
- "firstName": "Anne-Marie",
- "id": "291606795498498048",
- "lastName": "O'Connor",
- "password": "P@ssw0rd!1",
- "preferredLoginName": "user123@example.com",
- "userType": "TYPE_HUMAN",
- "username": "user123@example.com"
}
}
], - "meta": {
- "count": 25
}
}