API Reference
This page summarizes the backend-facing contracts a partner integration should expect.
Identity
Partner auth/signing responsibility:
- the partner backend stores the app secret
- the backend returns a signed session to the mobile app
- the SDK does not hold the app secret or call the partner signing flow by itself
HTTP auth stays:
X-App-IDX-User-IDAuthorization: Bearer <userHash>
MQTT auth now stays broker-native:
username = sdk:<appId>:<externalUserId>password = <userHash>- no MQTT
Bearerprefix
GET /v1/sdk/me
Used by the SDK to enrich the signed session with canonical backend identity.
SOS
POST /v1/sdk/sos/cancel
Transactional cancel request.
Notes:
- no business meaning should be inferred from the HTTP response alone
- final SOS lifecycle state still comes from the operational runtime lifecycle
GET /v1/sdk/sos
Used for SOS rehydration on startup/bootstrap and identity refresh.
Devices
/v1/sdk/devices
Backend device registry surface.
Mapped public shape:
idhardwareIdfirmwareVersionhardwareModelpairedAtcreatedAtupdatedAt
Contacts
Contacts are aligned 1:1 with the backend contract:
idnamephoneemailprioritycreatedAtupdatedAt
Operational transport
The SDK also relies on operational transport for SOS/telemetry flows. Topic naming and exact transport details should remain aligned with the backend contract, not hardcoded independently by the host app.
The configured broker URI may use ssl://, tls://, tcp://, ws://, or wss:// depending on the environment and runtime transport client.