iLOQ

iLOQ is an innovative digital locking solution that enhances security and access management for various applications. It provides keyless entry and remote access control, making it suitable for both residential and commercial environments. Users can easily manage access rights, ensuring that only authorized individuals can enter specific areas. The system operates on a unique, battery-free design that harnesses energy from the act of inserting the key, reducing maintenance costs and contributing to sustainability. Its robust encryption and wireless communication capabilities ensure secure and reliable access.

When integrated with platforms like Make, iLOQ streamlines workflows and enhances automation. Users can create custom scenarios that trigger actions based on specific events, such as granting access when a user arrives at a location or logging entry and exit times for security audits. This integration provides a seamless connection between physical access control and digital management systems, making iLOQ a forward-thinking solution that combines convenience, security, and efficiency for modern access management needs.

What iLOQ modules are available in the Make platform

  • Person - List all People, Get a Person, Create a Person, Update a Person, Delete a Person
  • Key - List all Keys, List all Keys by Person, Get a Key, Create a Key, Update a Key, Delete a Key
  • Lock - List all Locks, Get a Lock, Create a Lock, Update a Lock, Delete a Lock, Get a Lock Logs
  • Security Access - List all Security Accesses, Get a Security Access, Create a Security Access, Update a Security Access, Delete a Security Access
  • Events - Watch Lock Events
  • Other - Make an API Call

Connecting iLOQ to Make

  1. To establish the connection in Make, insert an iLOQ module into a scenario. Under Connection, click “Create a connection” App_iLOQ_CreateConnection

    The Create a Connection dialog appears.

  2. In the Connection name field, enter a name to identify the connection.

  3. Enter your Registered BPT App License Key.

  4. Enter your iLOQ Username, Password, and Customer Code.

  5. Enter your iLOQ BaseURL.

    • This uses the URL retrieved from the REST API call Resolve URL
  6. Click Save

You have successfully established the connection.

Build iLOQ Scenarios:

After connecting the app, you can perform the following actions:

Person

List all People

This API returns all of the people in the iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)

Get a Person

Gets individual Person by Identifier

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Person ID *The unique identifier of the person whose details are requested.

Create a Person

Create a new Person into iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
AddressThe unique identifier of the person whose details are requested.
Company nameName of the Company that the person is employed by
Contact infoAdditional info of Person
CountryCounty of Person Resides
DescriptionFree-text field for notes or additional information.
EmailPrimary email address.
Employment End DateDate when the person’s employment ended.
External Can EditIndicates if the external system has permission to edit this record.
External Person IDIdentifier assigned by an external system, if applicable. Used for data sync. (Advanced)
First NameFirst Name
Language CodePerson’s language for SMSs and emails. ISO 639 format
Last NameLast Name
Person IDSet a GUID to create a person (Advanced)
Person CodeCode identifying user. For example social security number.(Advanced)
Phone 1Phone number 1
Phone 2Phone number 2
Phone 3Phone number 3
Post OfficeCity or post office info
StateIs person in use or not in use: 0 = Active person1 = Person is not in use
Work TitleWork title in the company.
Zip CodePostal Code of the user
Zone IDsZones which the user is linked to (Advanced)

Update a Person

Update an existing person in the iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
AddressThe unique identifier of the person whose details are requested.
Company nameName of the Company that the person is employed by
Contact infoAdditional info of Person
CountryCounty of Person Resides
DescriptionFree-text field for notes or additional information.
EmailPrimary email address.
Employment End DateDate when the person’s employment ended.
External Can EditIndicates if the external system has permission to edit this record.
External Person IDIdentifier assigned by an external system, if applicable. Used for data sync. (Advanced)
First NameFirst Name
Language CodePerson’s language for SMSs and emails. ISO 639 format
Last NameLast Name
Person IDSet a GUID to create a person (Advanced)
Person CodeCode identifying user. For example social security number.(Advanced)
Phone 1Phone number 1
Phone 2Phone number 2
Phone 3Phone number 3
Post OfficeCity or post office info
StateIs person in use or not in use: 0 = Active person1 = Person is not in use
Work TitleWork title in the company.
Zip CodePostal Code of the user
Zone IDsZones which the user is linked to (Advanced)

Delete a Person

Deletes an individual Person by Identifier

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Person ID *The unique identifier of the person whose details are requested.

Key

List all Keys

This API returns all of the keys in the iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)

Get a Key

Gets Key by Identifier

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Key ID *The unique identifier of the key whose details are requested.

Create a Key

Create a new key in iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
DescriptionKey Description/Name
Expire DateSet Expiry Date of new key
Key IDSet GUID of create Key
Info TextAdditional Info
Key type MaskiLOQ Key Type
Person IDPerson to whom the key is linked to
Real estate IDID of the real estate where this key belongs to.
Rom IDROM ID. Not used in inserting new key. (Advanced)
StampStamp. Number consisting of 4 digits written to the physical key.
Tag KeyRFID Tag. Empty string if not given (Advanced)
Version CodeVersion information (Advanced)
Renew End DateWhen renewing ends
Renew Gap CountGaps in days/weeks before renewed (depending on Renew Gap Type)
Renew Gap TypeKeyScheduler renew type0 = Not in use1 = Daily renew2 = Weekly renew
Renew MinuteHow long before key’s expiration it is renewed. Time is in minutes. For example if value is 120, new programming packet is made about 2 hours before expiration. Minimum is 70 minutes.
Offline Expiration SecondsS50 Time key works offline in seconds. Zero = unlimited offline access. Maximum is 16761540 seconds for key fob and 8726340 seconds for phone.
Security Access IDsSecurity accesses which should be linked to the new key
Limit DateDate of which depends on Slot Number. Null when Slot Number is 2
Slot NumberKey time limit slot no0 = S10/S50 start date or S10 timelimit1 = S10/S50 end date or S10 timelimit2 = S50 timelimittitle link
End Time (ms)Start time in milliseconds when this time limit ends on given weekdays For example 57 600 000 would be 16:00 in the afternoon. Must be divisible by 15 minutes.
Start Time (ms)Start time in milliseconds when this timelimit begins on given weekdays. For example 28 800 000 would be 8:00 in the morning. Must be divisible by 15 minutes.
Week DayWeekdays mask to inform when this time limit is in use
Time Limit Title IDID for a previously set Time Limit (advanced)
Time Limit Title End DateEnd date of TimeLimitTitle in locking systems’s time zone
Time Limit Title Start DateStart date of TimeLimitTitle in locking systems’s time zone
Time Zone IDTime zone of the time limit.
Zone IDsZones the new key belongs to

Update a Key

Update an new key in iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
DescriptionKey Description/Name
Expire DateSet Expiry Date of new key
Key IDSet GUID of create Key
Info TextAdditional Info
Is ProgrammedHas key ever been programmed yet. Read only. Programming state can be other than Programmed if there has been changes made to the key after it has been programmed the first time
Key type MaskiLOQ Key Type
Person IDPerson to whom the key is linked to
Programming StateKeys’ and locks’ logical states.0 = Planning state1 = Ordered. Programming packet is available on server. If key is a phone key, then this means that the key has been sent.2 = Packet has been retrieved from server to programming but hasn’t been acknowledget yet3 = Programmed4 = Zeroed. In use only for locks.5 = Cancelled. Inner use only.6 = Obsolete. Inner use only.7 = Programming packet is transferred to programming key but hasn’t been acknowledged yet-1 = Error
Real estate IDID of the real estate where this key belongs to.
Rom IDROM ID. Not used in inserting new key. (Advanced)
StampStamp. Number consisting of 4 digits written to the physical key.
Stamp SourceThe source of the key labeling (Stamp). Read only.0 = User-entered1 = Read from the key. Key labeling (Stamp) can not be edited.2 = Retrieved from the database
Tag KeyRFID Tag. Empty string if not given (Advanced)
Tag Key HexRFID Tag presented as HEX. Empty if TagKey is absent. (Advanced)
Tag Key SourceThe source of the key’s tagkey enumeration. (Advanced)0 = User-entered1 = Read from the key. Key’s tagkey can not be edited.
Version CodeVersion information (Advanced)

Delete a Key

Delete Key by Identifier

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Key ID *The unique identifier of the key whose details are requested.

List all Keys by Person

Gets all keys associated by person

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Person ID *The unique identifier of the person whose key details are requested.

Lock

List all Locks

This API returns all of the Locks in the iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)

Get a Lock

Gets Locks by Identifier

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Lock ID *The unique identifier of the lock whose details are requested.

Create a Lock

Create a new Lock in iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Clock InstalledIs clock installed
Clock Installed DateDate when clock was installed
Data VersionData version (Advanced)
Description *Key Description/Name (Required) Max 50 Characters
Direction *Access Directions (Required) Max 50 Characters
Door Thickness (mm) *Door Thickness (Required) Max 50 Characters
Door TypeDoor Type
ExtExtension or variant number of the lock.
Ext Description *Description for the extension or variant.
Extention Piece *Identifier or description of the mechanical extension piece.
Lock IDSet GUID of created lock (Advanced)
Floor Plan IDSet Floor Plan by ID
Floor Plan Point XX position on floor plan
Floor Plan Point YY position on floor plan
Handed *Indicates the handedness (left/right).
Hardware VersionHardware version of the lock.
Key Chamber *Locking chamber or cylinder type.
Location Code *Code representing the physical location.
Lock Code *Internal lock code used for identification.
Lock Framework *Lock framework type or housing reference.
Lock Framework Depth *Depth measurement or parameter of the framework.
Locking Object *Describes the object being secured, such as a door or cabinet.
Lock Settings *Encoded or text-based configuration settings for the lock.
Lock StateLock state from lock’s acknowledge packet. (Advanced)
Lock TypeLock types.- Normal S10 lock- S10 network module lock- S50 lock- C5 lock- S5Online lock for 5 Series network module- D5 locks
Manufacturing InfoDetails from production, such as batch or factory data.
Mech VersionMechanical design version of the lock.
MountingHow the lock is installed, such as surface or recessed.
Other EquipmentAdditional equipment associated with this lock. (Advanced)
Real estate IDID of the real estate where this key belongs to.
SecretEncrypted secret used for secure communication. (Advanced)
Serial NumberFactory serial number of the lock hardware.
StampStamp. Number consisting of 4 digits written on the lock.
Software VersionSoftware or firmware version running on the lock. (Advanced)
Zone IDsZones the new key belongs to
S10 Collect Audit TrailEnables collection of audit events for S10 locks.
S40 Accept Soft GroupAllows S40 locks to accept software-based access groups.
S40 Flip FlopEnables toggle (flip-flop) function for S40 locks.
S40 Logging OnActivates event logging for S40 locks.
S40 Online Required HardRequires the lock to operate only when online (strict mode).
S40 Online Required SoftRequires online presence for normal operation but allows exceptions.
Save Online Lock Audit TrailSends and stores audit trail data on the server.
Relay K1 DelayDelay before relay K1 activates in milliseconds
Relay K2 DelayDelay before relay K2 activates in milliseconds
Relay MaskBitmask defining which relays are used. (Advanced)
Relay ModeDefines how the relay operates, such as timed or latch mode. Relay lock’s modes0 = Latch1 = Pulse3 = Key hold7 = Roller door255 = Dipp
Relay Name DataHuman-readable label for the relay configuration.
Relay PacketIndicates if relay configuration is transferred as a packet.
Relay Quasar DelayDelay specific to Quasar relay function.
Relay Quasar ModeOperating mode for Quasar relay.
Lock Respects All Time LimitsForces the lock to respect all defined access time limits.
Relay MaskRelay selection mask applied to the access rule.
Security Access IDID linking to the security access profile.
Time Limit Title IDsList of IDs for time-limit profiles applied to the lock.

Update a Lock

Update an new lock in iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Default Program Station FProg Key IDID of the programming station or key used as the default for this lock. Used when updating configuration or reprogramming associations.
DescriptionDescriptive name or label for the lock. Commonly updated when renaming or clarifying lock usage.
DirectionDoor swing direction, such as left or right. Indicates physical orientation for installation reference.
Door ThicknessThickness of the door the lock is fitted to. Adjusted if hardware is moved or replaced on a door of different thickness.
Door TypeDescribes the door material or type, for example wood or steel.
ExtLock extension code or number. Used to distinguish between lock variants within a model line.
Ext DescriptionTextual description of the extension type or variant. Helps clarify mechanical details.
Extention PieceIdentifier or name of the mechanical extension piece attached to the lock.
Lock IDInternal unique identifier for the lock record. Required when performing an update. (Required)
HandedIndicates the door’s handedness (left- or right-handed). Used for correct orientation in planning and maintenance.
Key ChamberType or specification of the lock’s key chamber or cylinder. Defines compatibility with key systems.
Location CodeCustom code or label representing where the lock is installed within the site.
Lock FrameworkModel or type of the framework (housing) the lock is mounted into.
Lock Framework DepthDepth of the lock framework. Used for installation verification.
Locking ObjectDescription of what the lock secures, such as “Server Room Door” or “Cabinet 12”.
Lock TypeNumerical or coded value indicating the lock’s model or operational category. Lock types.- Normal S10 lock- S10 network module lock- S50 lock- C5 lock- S5Online lock for 5 Series network module- D5 locks
MountingDescribes the mounting style, such as surface or recessed installation.
Other EquipmentNotes additional connected components, for example strike plates or sensors.
Real Estate IDIdentifier linking the lock to a building or real estate record in the system.
StampInternal version or update marker used to track modification time.
StateCurrent state of the lock entry, for example active, deleted, or archived. Physical lock states- Lock is in planning- Lock is installed- Lock is not in use- Lock is hidden in 5 Series Manager.
Zone IDIdentifier of the zone where the lock belongs. Defines access grouping and security area relationships.

Delete a Lock

Delete Lock by Identifier

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Lock ID *The unique identifier of the key whose details are requested.

Get Lock Logs

Get Lock Logs by timestamp, Date Range or All logs

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Lock Logs API endpointThe unique identifier of the key whose details are requested.
Lock IDsAll Lock IDs to be returned in the Logs
Key IDsAll Key IDs to be returned in the Logs
Going End DateReturn logs where going date is before this end date.
Going Start DateReturn logs where going date is after this start date.
Type MaskLock log types multple select type:- Unknown type- Failed access- Lock was programmed- Successful access- In a locking systems where S50 lock closing reminder is taken into use, indicates that the key holder has accessed a lock that requires key holder’s response if the lock was opened or closed.- Key accessed the lock- 5 Series key accessed the lock- Unknown key (Key is empty or in factory state)- Snap open access- Log is a key passage from a lock which doesn’t collect logs.- Key programming task.- The audit trail GoingDateUtc is not from RTC but the latest timestamp the lock knows- Transit date is incorrect and not available
End DateEnd date and time the logs are returned for
Start DateStart date and time the logs are returned for

Security Access

List all Security Accesses

This API returns all of the Security Accesses in the iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)

Get a Security Access

Gets Security Access by Identifier

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Security Access ID *The unique identifier of the Security Access whose details are requested.

Create a Security Access

Create a new Security Access in iLOQ system

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Access ModeAccess mode- show as default- hide as default
Default AccessIs security access set for locks as default- Security access is not set for locks as default- Security access is set for locks as default
DescriptionDescription (Required) Max 50 Characters
ExtOption if time control/additional conditions are on.- Time control is not in use- Time control is in use
Ext DescriptionDescription for what the Ext value means (for example, time control is on).
NameName of Security Access
Parent Security Access IDParent security access ID if this security access is nested and linked to parent.
Real Estate IDID of the real estate where this security access belongs to.
Security Access IDSet newly create Security Access GUID. (Advanced)
StatusStatus. Only Active access rights can be created.- Active- Security access is no longer in use.- Security access is block listed- Security access is lead to blocklist through a key (only possible on lock security accesses)- Blocked
TypeType. Only standard access and API access can be added. Key types are created when keys are block listed.- Key security access. This is only for keys which are in blocklist and is created automatically when Key is block listed.- Standard access- Mask. Not in use.- API Access
Version NumberVersion number if versioned security access. (Advanced)
Zone IDsZones the new security access belongs to (Advanced)

{{ /collapse >}}

Update a Security Access

Update an new lock in iLOQ system

    <tr>
      
        <th></th>
      
        <th></th>
      
    </tr>
  
</thead>
<tbody>
  
    <tr>
      
        <td><strong>Connection</strong></td>
      
        <td><em>Select the required connection from the drop-down.</em><!-- raw HTML omitted --><!-- raw HTML omitted --><em>If no connection exists,</em> 

<a href="#connecting-iloq-to-make"

Create Connection.

    </tr>
  
    <tr>
      
        <td><strong>Select Lock Group *</strong></td>
      
        <td>Select the Locking System to authenticate for the chosen locking system. <em>(Required)</em></td>
      
    </tr>
  
    <tr>
      
        <td><strong>Access Mode</strong></td>
      
        <td>Access mode<!-- raw HTML omitted --><!-- raw HTML omitted -->- show as default<!-- raw HTML omitted -->- hide as default</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Default Access</strong></td>
      
        <td>Is security access set for locks as default<!-- raw HTML omitted --><!-- raw HTML omitted -->- Security access is not set for locks as default<!-- raw HTML omitted -->- Security access is set for locks as default</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Description</strong></td>
      
        <td>Description</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Ext</strong></td>
      
        <td>Option if time control/additional conditions are on.<!-- raw HTML omitted --><!-- raw HTML omitted -->- Time control is not in use<!-- raw HTML omitted -->- Time control is in use</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Ext Description</strong></td>
      
        <td>Description for what the Ext value means (for example, time control is on).</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Name</strong></td>
      
        <td>Name of Security Access</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Parent Security Access ID</strong></td>
      
        <td>Parent security access ID if this security access is nested and linked to parent.</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Real Estate ID</strong></td>
      
        <td>ID of the real estate where this security access belongs to.</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Security Access ID *</strong></td>
      
        <td>Set Security Access ID to be updated. <em>(Required)</em></td>
      
    </tr>
  
    <tr>
      
        <td><strong>Status</strong></td>
      
        <td>Status. Only Active access rights can be created.<!-- raw HTML omitted --><!-- raw HTML omitted -->- Active<!-- raw HTML omitted -->- Security access is no longer in use.<!-- raw HTML omitted -->- Security access is block listed<!-- raw HTML omitted -->- Security access is lead to blocklist through a key (only possible on lock security accesses)<!-- raw HTML omitted -->- Blocked</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Type</strong></td>
      
        <td>Type. Only standard access and API access can be added. Key types are created when keys are block listed.<!-- raw HTML omitted --><!-- raw HTML omitted -->- Key security access. This is only for keys which are in blocklist and is created automatically when Key is block listed.<!-- raw HTML omitted -->- Standard access<!-- raw HTML omitted -->- Mask. Not in use.<!-- raw HTML omitted -->- API Access</td>
      
    </tr>
  
    <tr>
      
        <td><strong>Version Number</strong></td>
      
        <td>Version number if versioned security access. <em>(Advanced)</em></td>
      
    </tr>
  
    <tr>
      
        <td><strong>Zone IDs</strong></td>
      
        <td>Zones the new security access belongs to <em>(Advanced)</em></td>
      
    </tr>
  
</tbody>

Delete a Security Access

Delete Security Access by Identifier

{{ collapse title=“Details” id=“Delete-a-Security-Access” >}}

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system. (Required)
Security Access ID *The unique identifier of the Security Access whose details are requested.

Events

Watch Lock Events

Watch New Lock Events on a Poll

This module contains the following fields

ConnectionEstablish a connection to your iLOQ account.
Select Lock Group *Select the Locking System to authenticate for the chosen locking system.
Lock IDsAll Lock IDs to be returned in the Logs
Key IDsAll Key IDs to be returned in the Logs
TypeLock log types multple select type:- Unknown type- Failed access- Lock was programmed- Successful access- In a locking systems where S50 lock closing reminder is taken into use, indicates that the key holder has accessed a lock that requires key holder’s response if the lock was opened or closed.- Key accessed the lock- 5 Series key accessed the lock- Unknown key (Key is empty or in factory state)- Snap open access- Log is a key passage from a lock which doesn’t collect logs.- Key programming task.- The audit trail GoingDateUtc is not from RTC but the latest timestamp the lock knows- Transit date is incorrect and not available

Other

Make An API Call

Performs an arbitrary authorized API call.

This module contains the following fields

ConnectionSelect the required connection from the drop-down.If no connection exists, Create Connection.
URLEnter a path relative to https://{{baseURL}}/api/v2/. For example: /keysFor the list of available endpoints, refer to the https://s5.iloq.com/iloqpublicapidoc .
MethodSelect the HTTP method you want to use:GET to retrieve information for an entry.POST to create a new entry.PUT to update/replace an existing entry.PATCH to make a partial entry update.DELETE to delete an entry.
HeadersEnter the desired request headers. You don’t have to add authorization headers; we already did that for you.
Query StringEnter the request query string.
BodyEnter the body content for your API call.