Cloud Administration Mark User Deleted API
The Cloud Administration Mark User Deleted API can do the following:
Mark an inactive user as pending for future deletion. The marked user will be deleted from the Cloud Access Service (CAS) when automatic bulk deletion has taken place.
- Undelete a user if marking the user for deletion was a mistake.
Users marked as deleted are removed from CAS after seven days. Once deleted, a user can no longer authenticate through the service or register a device. Deletion removes all information and devices associated with the user from CAS.
For information about managing access to this API, see Accessing the Cloud Administration APIs.
Authentication
Clients calling this API must authenticate themselves by including a JSON Web Token in a request. For instructions on using this token, see Authentication for the Cloud Administration REST APIs.
Software Developer Kit
You can download the API Software Developer Kit (SDK) from Cloud Administration REST API Download.
Request Requirements
Use the following information to mark a user for deletion.
| Method | Request URL | Response Codes |
|---|---|---|
| PUT |
/AdminInterface/restapi/v1/users/ <userId>/markDeleted | 200, 400, 403, 404, 405, 409, 429, 500 |
Request Parameter
The Mark Deleted API allows the following parameter.
| Request Parameter | Description | Data Type |
|---|---|---|
| <userId> |
Unique user identifier that is sent in response to the User Details API. | String |
Request Body
The following table describes the request body.
| Request Body | Description | Data Type |
|---|---|---|
| markDeleted | Must be true or false.
| Boolean |
Example Request Data
The following example displays a request.
PUT /https://localhost/AdminInterface/restapi/v1/users/eb2e12ae-1112-451b-98e1-dfe4e6afd60d/markDeleted
Content-Type: application/json
Authorization: Bearer <JWT token>
{
"markDeleted": "true"
}
Example Response
The following example response shows the deletion status of a single user.
{
"id": "bf40077e-767b-495d-a7c8-d9909601bea6",
"markDeleted": "true",
"markDeletedBy": "Some user",
"markDeletedAt": "2018-08-31T19:10:30.045Z"
}
Response Property Descriptions
The following table shows property descriptions and data types.
| Property | Description | Data Type |
|---|---|---|
| id | Identifies the user. | String |
| markDeleted | Indicates whether the user is marked for delete. | Boolean |
| markDeletedAt | Date when a user is marked for delete. for information on formatting timestamps in ISO 8601 format. | String |
| markDeletedBy | Administrator who initiated mark for delete. | String |
Response Codes
The following table shows response codes and descriptions for API.
| Code | Description |
|---|---|
| 200 | Successfully marked the user for deletion or cleared marked user for deletion. |
| 400 | Operation is not performed. One of the following messages is returned:
|
| 403 | Not authorized to perform the request. |
| 404 | User does not exist. |
| 405 | Method Not Allowed. The method you are using is not allowed for users in the SCIM Managed and Azure Active Directory (SCIM) identity sources. |
| 409 | Operation is not performed because it violates a business rule and returns one of the following messages:
|
| 429 | Too many requests. |
| 500 | Internal server error occurred when processing the request. The following message is returned: Unknown error. Mark user for Delete/Undelete returned null response from CAS. Or an unexpected error occurred. |
Related Articles
Cloud Administration User Status API 55Number of Views User Dashboard 63Number of Views Ping Directory- Identity Source Integration - RSA Ready Implementation Guide 16Number of Views Cloud Administration Retrieve License Usage API Version 1 41Number of Views Workflow email nodes do not generate emails in Identity Governance and Lifecycle when the message body is blank 12Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide