home

Mobile Endpoint Security

Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Show Page Sections

Use the Mobile Risk API Version 2

Authentication

You authenticate to the API using the Lookout platform’s OAuth 2.0 Client Credentials Grant Flow where an application key is exchanged for an access token to use in API calls. See Authenticating to Access MES APIs for the procedure to get an access token.

Stream Events

When you open a unidirectional streaming channel to monitor and feed into your event handlers, you start the stream using /mra/stream/v2/events, going back as far back as 10 days. See the Swagger API documentation for complete details.

Authentication

Opening a connection

Receiving events

Responding to an unexpectedly closed connection

Responding to ‘end’ or ‘reconnect’ events.

Make Requests

You can make requests to the RESTful API to return specific information from your device fleet. See the Swagger API documentation for complete details:

  • Query single and multiple devices for IDs, connector and MDM information, operating system parameters, and so on.
  • Query single and multiple issues affecting your fleet using filters provided in the API.
  • Query single and multiple PCP (phishing and content protection) issues affecting safe browsing.
  • Advanced and premium customers can query device operating system vulnerabilities that may be affecting your fleet.