The Nexterm REST API gives you programmatic access to every resource managed by your Nexterm server — entries, folders, identities, organizations, scripts, snippets, and monitoring data. All endpoints are served over HTTP or HTTPS on portDocumentation Index
Fetch the complete documentation index at: https://mintlify.com/gnmyt/Nexterm/llms.txt
Use this file to discover all available pages before exploring further.
6989 and return JSON.
Base URL
your-server with the hostname or IP address of the machine running Nexterm. If you have TLS configured, use https.
Authentication
Most endpoints require a valid session token passed as a Bearer token in theAuthorization header.
Step 1 — Obtain a token
token field and also sets the token in the Authorization response header.
If the
Authorization header is missing or the token is invalid, the API returns 400 or 401 respectively. Tokens remain valid until explicitly revoked via POST /api/auth/logout or deleted from the Sessions panel.Common response format
All responses are JSON objects. Successful responses return the requested data directly. Error responses always include acode field matching the HTTP status code and a human-readable message.
Success
HTTP status codes
| Code | Meaning |
|---|---|
200 | Request succeeded. |
201 | Resource created successfully. |
400 | Bad request — missing or invalid parameters. |
401 | Unauthorized — token missing, expired, or invalid. |
403 | Forbidden — authenticated but insufficient permissions. |
404 | Resource not found. |
409 | Conflict — resource already exists. |
429 | Too many requests — rate limit exceeded. |
500 | Internal server error. |
Rate limiting
The device authorization endpoints (POST /api/auth/device/create) are rate-limited to 10 requests per hour per IP address for unauthenticated callers. Authenticated users bypass this limit. When the limit is exceeded the API returns:
RateLimit-* headers so your client can back off gracefully.
Admin-only endpoints
Certain endpoints — such as global monitoring settings — are restricted to accounts with theadmin role. Calling them with a non-admin token returns 403 Forbidden.
Next steps
Authentication
Login, logout, passkey, and device auth flows.
Entries
Create and manage server connection entries.
Folders
Organize entries into folders.
Identities
Manage SSH keys and credentials.
Monitoring
Server health and performance metrics.
Organizations
Multi-user collaboration and access control.
Scripts & Snippets
Reusable automation scripts and command snippets.