Approves a pending access request.
Grants the user the role they requested. Requires Admin role on the agent.
Authorization
Bearer JWT Authorization header using the Bearer scheme. Enter 'Bearer' [space] and then your token.
In: header
Path Parameters
The agent ID.
The user ID to approve.
The tenant identifier
Response Body
curl -X POST "https://api.fruxon.com/v1/tenants/string/agents/string/collaborators/string:approve"{
"agentId": "string",
"userId": "string",
"role": "VIEWER",
"status": "PENDING",
"alertPreferences": {
"errorAlerts": false,
"accessRequestAlerts": false,
"budgetAlerts": false
},
"createdAt": 0,
"modifiedAt": 0,
"tenantId": "00000000-0000-0000-0000-000000000000"
}Lists all collaborators for a specific agent.
Returns every user with an explicit grant on this agent along with their role (Viewer, Editor, or Admin) and joined user profile data (display name, email). Pending access requests created via `POST /v1/tenants/{tenant}/agents/{agent}/collaborators:requestAccess` are included with a pending status so admins can act on them. Tenant admins are not listed here — they have implicit access to all agents regardless of explicit grants.
Removes a collaborator's access from an agent.
Revokes the user's grant on the agent. Tenant admins retain implicit access regardless; this call only affects per-agent collaborator rows. Cannot remove the last remaining Admin — the request is rejected so the agent never becomes orphaned from explicit administration. Idempotent against users who have no current grant.