Skip to main content

Users

The users endpoint allows administrators to retrieve information about all users in the system.

List Users

GET/api/public/v0/users

Returns a list of all users in the system. This endpoint is restricted to administrators only.

Authentication

Requires an API key with Admin role permissions. See Authentication for more details.

Response Format

{
users: Array<{
email: string // User's email address
name: string // User's display name
role: 'owner' | 'admin' | 'user' | 'test-runner' | 'viewer' // User's role
authorizationTypes: Array<'password' | 'google'>; // Authentication methods
totpEnabled: boolean // Two-factor authentication status
createdAt: string // ISO 8601 timestamp
lastActivity: string // ISO 8601 date
}>
}

User Roles

RolePermissions
OwnerFull system access with tenant management
AdminFull project access with user management
UserCan create and manage test cases and runs
Test RunnerCan execute test runs only
ViewerRead-only access to projects

Example Request

curl \
-H "Authorization: ApiKey your.api.key.here" \
https://your-company.your-region-code.qasphere.com/api/public/v0/users

Example Response

{
"users": [
{
"email": "[email protected]",
"name": "System Admin",
"role": "admin",
"authorizationTypes": ["password"],
"totpEnabled": true,
"createdAt": "2024-01-01T00:00:00Z",
"lastActivity": "2024-11-14"
},
{
"email": "[email protected]",
"name": "Test Engineer",
"role": "test-runner",
"authorizationTypes": ["password", "google"],
"totpEnabled": false,
"createdAt": "2024-03-15T00:00:00Z",
"lastActivity": "2024-11-14"
}
]
}

Error Responses

Status CodeDescription
401Invalid or missing API key
403Insufficient permissions (non-admin access)
500Internal server error

Important Notes

RequirementDescription
EmailMust be valid and unique within the system
User namesMust be between 1 and 255 characters
DatesCreation and activity dates are in ISO 8601 format
AccessOnly administrators can access this endpoint
tip

This endpoint enables you to:

  • Audit user access and roles
  • Monitor user activity
  • Verify authentication methods
  • Check 2FA adoption