| Contents | iii
Transactions.............................................................................................................41
About the iControl REST transaction model.....................................................................................................41
About iControl REST transaction phases.............................................................................................. 41
About transaction validation...................................................................................................................42
Additional transaction properties............................................................................................................42
Creating an iControl REST transaction................................................................................................. 43
Modifying a transaction..........................................................................................................................43
Committing an iControl REST transaction............................................................................................44
About iControl REST asynchronous tasks.........................................................................................................45
Asynchronous task endpoints.................................................................................................................45
Using an asynchronous task...................................................................................................................46
Commands............................................................................................................... 47
About other tmsh global commands.................................................................................................................. 47
Using the cp command...........................................................................................................................48
Using the generate command.................................................................................................................48
Using the install command.....................................................................................................................49
Using iControl REST to create a key....................................................................................................49
Using the load command........................................................................................................................50
Using the mv command......................................................................................................................... 50
Using the publish command...................................................................................................................51
Using the reboot command.................................................................................................................... 51
Using the restart command.....................................................................................................................51
Using the reset-stats command...............................................................................................................52
Using the run command......................................................................................................................... 52
Using the save command....................................................................................................................... 52
Using the send-mail command...............................................................................................................53
Using the start command........................................................................................................................54
Using the stop command........................................................................................................................54
Application Security Manager.............................................................................. 54
Application Security Manager and iControl REST comparison........................................................................54
Retrieving Application Security Manager resources..............................................................................57
Creating Application Security Manager resources.................................................................................60
Updating Application Security Manager resources............................................................................... 61
Deleting resources in Application Security Manager............................................................................ 61
Application Security Manager policy.....................................................................................................62
Application Security Manager components........................................................................................... 66
Application Security Manager signatures.............................................................................................. 69
Application Security Manager schema upload.......................................................................................73
Application Security Manager policy restore........................................................................................ 73
Application Security Manager vulnerability import.............................................................................. 75
Application Security Manager vulnerability resolution......................................................................... 80
Exporting data protection in Application Security Manager................................................................. 83
Importing data protection in Application Security Manager................................................................. 83
Importing a certificate in Application Security Manager...................................................................... 84
Web Scraping Configuration settings.....................................................................................................84
Learning Suggestion Object................................................................................................................... 91
About Device ID.....................................................................................................................................95
About WebSockets..................................................................................................................................97
About AJAX/JSON Login....................................................................................................................100