Getting Started
This page describes how to get started with the Intelligence API in a simple way using Postman.
Prerequisites
- You need to have a team in Celonis Platform.
- You need to have a Knowledge Model available in your team.
- You must request the activation of the API in your Celonis Platform Team to the account team.
Before starting
Determine the URL for your team
First you need to determine what is the URL for your team and cluster.
-
The base URL for the Celonis API is
https://<team>.<cluster>.celonis.cloud/intelligence/api
To find the team and the cluster, please check the URL you use to access the Celonis Platform and retrieve the team and cluster from it.
For example, the base URL for dev team in US-2 cluster would be:
https://dev.us-2.celonis.cloud/intelligence/api
Install a REST client
Since the Intelligence API is a REST API, you will need to have a way to interact with it. There are multiple ways to do this, but to make things simple, we will use Postman, which is a very popular free REST client.
If you already have a REST client, you can ignore this section.
Otherwise, go to the Postman Download page and download it for your Operating System. Once it's downloaded, install it.
Once installed, it should look like something like this:
To start using it, create an account or click on "Skip and go to the app".
Authentication
Each request to the API must be authenticated with a Celonis Platform API key. There are multiple ways of doing this as detailed below.
About API Keys and Application Keys
While it is possible to use API keys and Application keys with Celonis, it's important to note that they are not the industry standard. Both keys have an unlimited lifetime and cannot be “rotated”. This means that users need to delete and recreate them to achieve the equivalent of key rotation, which can be a cumbersome process.
One issue (particularly relevant for API Keys) is that they give any application that uses them complete access to almost all the Celonis APIs. There is no way to restrict their access to only certain resources.
OAuth 2.0 as the Recommended Solution
OAuth 2.0 is a well-established industry standard that makes it easier to integrate customer-managed applications with Celonis. OAuth uses scopes to manage access to resources, which means that the OAuth clients can only access APIs allowed by the scopes they are configured to use.
For example, we can have the scope studio
that gives access to Studio or the scope audit.log:read
that gives read-only access to audit logs. For an OAuth client to be able to access a certain resource (API), the client must have the OAuth scope and the Celonis permission to do so. This follows the security principle of least privilege so that an OAuth client gets only the required privilege to perform a certain task and not more.
Using a User API key.
You can find out how to create an user API key by following our User API Keys guide.
The Celonis API uses Bearer Token Authentication for verifying consumer access. The credentials must be sent in an Authorization header in the HTTP request. Credentials sent in the URL or body of the request will be ignored.
To authenticate using Bearer Token Authentication:
-
Create the token in the Celonis Platform:
MDg5MGVkNDktNjMwZC00ODdiLTkyNGItMjNmMzMxNjRmM2IwOkhNUVRMUis4SGh6NHhBY21Vck9GaWdkem5rYzBrb3p0N056WUM0bGlqczMM
-
Include the string in the HTTP Authorization header formatted like this:
Authorization: Bearer MDg5MGVkNDktNjMwZC00ODdiLTkyNGItMjNmMzMxNjRmM2IwOkhNUVRMUis4SGh6NHhBY21Vck9GaWdkem5rYzBrb3p0N056WUM0bGlqczMM
Using an Application API key (user independent one).
You can find out how to create an AppKey by following our Application API Keys guide.
To authenticate using AppKey Authentication:
-
Create the AppKey in the Celonis Platform:
MzgyZDEzYjItNjI1MS00NTIwLTk1YTItY2ZjYzMzZTllOTNmOkE3a1dvYnpYQ0c3aUtUdTNRNC9UNzFLUXZmY0E2ZjVXUUROajFoN1R5UzIr
-
Include the string in the HTTP Authorization header formatted like this:
Authorization: AppKey MzgyZDEzYjItNjI1MS00NTIwLTk1YTItY2ZjYzMzZTllOTNmOkE3a1dvYnpYQ0c3aUtUdTNRNC9UNzFLUXZmY0E2ZjVXUUROajFoN1R5UzIr
IMPORTANT: For production solutions, we strongly recommend using Application keys instead of User API keys. User API keys should be used for testing purposes only.
Using an OAuth token
To generate tokes using OAuth, it is necessary to follow some configuration steps, described below.
How to Register OAuth client in Celonis Platform
OAuth can be used as an authentication method for Celonis Platform, which offers a more secure and flexible way of granting permissions to clients (applications) compared to API keys.
OAuth client Authentication Methods
Client secret basic: with this method, the client sends the clientid and clientsecret using the Authorization header, in the following format:
- Authorization: Basic encoded_credentials.
Here the value of encodedcredentials corresponds to the base64 encoding of OAuth client’s **clientid:client_secret**.
Client secret post: the client authentications itself by providing the client_id and client_secret in the HTTP request body as a form parameter. To ask for multiples scopes each scope should be separated by space
Registering a OAuth client in Celonis Platform
- In the Celonis Platform instance, go to Admin & Settings
- Click Applications .
- Then in the upper-right corner, click Add New Application and select "OAuth Client".
- Give your client a meaningful name.
- The OAuth grant type supported is “Client Credentials”. Select one of the following authentication methods: Client secret basic or Client secret post .
- Click Define scopes - Scopes do not grant any additional permissions beyond what the client has. They specify the access-level that the client needs. Select what levels within Celonis Platform the clients will have access to based on granted permissions. Every scope has a name and a description, describing what can be accessed with the scope based on the permissions granted to the client
- Click Create .
As scopes only allow access to the APIs, the created OAuth client should now be assigned permissions to resources behind those APIs.
After creating a client in the Celonis Platform, developers receive client credentials: client ID and client secret. The client secret needs to be copied as it cannot be accessed again in the future.
OAuth Endpoints
The token endpoint is available at https://< team-url >/oauth2/token.
OAuth request
curl --request POST \
--url https://<team>.<cluster>.celonis.cloud/oauth2/token \
--header 'content-type: multipart/form-data' \
--form client_id=<client id> \
--form client_secret=<client secret> \
--form grant_type=client_credentials \
--form scope=<scope1 scope2 scopeN>
OAuth token response
{
"access_token": "eyJraWQiOiJkZXZlbG9wLWVzMzg0IiwiYWxnIjoiRVMzODQifQ.eyJhdWQiOlsiYjllMzgwZDYtMmUxZS00MmQ5LWI3YjUtZTJkZDI5MGYxZTU5IiwiYXBpbmF1dHMuZGV2ZWxvcC5jZWxvbmlzLmNsb3VkIl0sIm5iZiI6MTcxMjEzNDU4NywiYXpwIjoiYjllMzgwZDYtMmUxZS00MmQ5LWI3YjUtZTJkZDI5MGYxZTU5Iiwic2NvcGUiOlsib3BlbmlkIl0sImlzcyI6Imh0dHBzOi8vYXBpbmF1dHMuZGV2ZWxvcC5jZWxvbmlzLmNsb3VkIiwiZXhwIjoxNzEyMTM1NDg3LCJpYXQiOjE3MTIxMzQ1ODcsImp0aSI6IjI2ZjlhNTU3LWQwMTEtNDcyNy05MTNhLWU3NmU3MDIzMTkyMyJ9.XIBj89ymumPaDL_InAsuWiL_6e5GeMpDGgPz3cZNWF3rNzNTc4GRAXMrtBjU9Gg6SWpyqPK0tTaTsrf88fmc0MboYXvKH0CxtpqWlDp0h_QSRMb1ZsCD226kv83xbh86",
"scope": "scope1 scope2 scopeN",
"token_type": "Bearer",
"expires_in": 899
}
Regenerating OAuth client secrets
For security reasons, you may want to regenerate the client secret. For this, navigate to Admin & Setting > Applications and find the OAuth client. Click on the three dots menu on the right and choose Regenerate Secret. After getting the new secret, make sure to update it in any integration in which this client is used.
Managing OAuth Client Consent
During OAuth authorization flows, users can give consent to OAuth clients to access resources on their behalf. To view which OAuth clients have been granted consent, navigate to Edit Profile and then to the OAuth Client Management section. There, you can view which applications (OAuth clients) have been granted consent and you can revoke such a consent by clicking on Edit and then Revoke Consent for the corresponding client.
OAuth Scopes used in Intelligence API
-
OAuth Scope:
- studio
How to use OAuth token
The Celonis API uses Bearer Token Authentication for verifying consumer access. The credentials must be sent in an Authorization header in the HTTP request. Credentials sent in the URL or body of the request will be ignored.
To authenticate using Bearer Token Authentication:
-
Call the token endpoint (
https://< team-url >/oauth2/token
) to issue a new token. -
Include the
access token
in the HTTP Authorization header formatted like this:
Authorization: Bearer eyJraWQiOiJkZXZlbG9wLWVzMzg0IiwiYWxnIjoiRVMzODQifQ.eyJhdWQiOlsiYjllMzgwZDYtMmUxZS00MmQ5LWI3YjUtZTJkZDI5MGYxZTU5IiwiYXBpbmF1dHMuZGV2ZWxvcC5jZWxvbmlzLmNsb3VkIl0sIm5iZiI6MTcxMjEzNDU4NywiYXpwIjoiYjllMzgwZDYtMmUxZS00MmQ5LWI3YjUtZTJkZDI5MGYxZTU5Iiwic2NvcGUiOlsib3BlbmlkIl0sImlzcyI6Imh0dHBzOi8vYXBpbmF1dHMuZGV2ZWxvcC5jZWxvbmlzLmNsb3VkIiwiZXhwIjoxNzEyMTM1NDg3LCJpYXQiOjE3MTIxMzQ1ODcsImp0aSI6IjI2ZjlhNTU3LWQwMTEtNDcyNy05MTNhLWU3NmU3MDIzMTkyMyJ9.XIBj89ymumPaDL InAsuWiL 6e5GeMpDGgPz3cZNWF3rNzNTc4GRAXMrtBjU9Gg6SWpyqPK0tTaTsrf88fmc0MboYXvKH0CxtpqWlDp0h QSRMb1ZsCD226kv83xbh86
Authorization
You must set the right permissions and ensure the User API Key or the Application API Key leveraged for authorization purposes has access to the Celonis Celonis Platform Studio package containing the Knowledge Model(s) you would like to access through Intelligence APIs.
You can grant access permissions by following these steps:
- Go to the Studio package.
-
Click on the three dots and select
Permissions
from the pop-up menu. -
Search for the User (in case you are using a
Bearer token
) or AppKey (in case you are using an
AppKey
) and grant at least
USE PACKAGE
rights.
Consuming the Intelligence API
Once we have completed the previous steps, we can start making requests to the API. For that we will use Postman (or any other REST client), which we should already have installed in our system.
- Go to File > New... and select "HTTP Request". Once you do this, you should see something like this:
- Enter the request URL next to the Send button. For this URL we will use the one from the "Determine the URL for your team" section: https://dev.us-2.celonis.cloud/intelligence/api .
- Now we need to set our API or Application Key in order to authenticate our requests. To do this, click on the Headers tab beneath the URL we just entered. Enter "Authorization" as the Key and for Value, enter:
-
Bearer <YOUR_KEY>
if you have a User API Key -
AppKey <YOUR_KEY>
if you have a AppKey
In the following example, we have an AppKey:
Getting the list of Knowledge Models
Once we have completed the steps above, we should now be able to start getting some data. We will start getting the full list of Knowledge Models that our API token has access to.
First, append "/knowledge-models" to the URL we in the previous steps: https://dev.us-2.celonis.cloud/intelligence/api/knowledge-models.
After that, click the Send button next to the URL and you should see something like:
Inside the Content section, you will see a list of all your Knowledge Models. The Knowledge Models will be divided into pages. By default, the page size will be 50. If you have more than 50 Knowledge Models, you can navigate to the following page, adding a "page" query parameter. The pages start at 0, so you can display the second page by setting a page value of 1.
In our example, this is not needed as we only have 13 Knowledge Models. However, you might want to specify other query parameters such as:
- pageSize: Sets the size of each page.
- sort: Sort the results by id or name.
You can check the full list of parameters and possible responses from this page.
You can also check the full list of possible errors you can receive in the API, in case you need to troubleshoot any issue.
In this quick guide, we managed to create our first request to Intelligence API. If you would like to do more advanced requests, we recommend you to check the full list of capabilities of our API or take a look at this other guide that walks you through the rest of schema endpoints.