David,
here is the output from /devices?devicetypeId=br400
I triggered this by going to the WiFi adapters section of my app.
[
{
"attributes": {
"bleFirmwareVersion": "1.4.0",
"hardwareVersion": "1.0.0",
"lastActionStatus": "null",
"lastTalkedTime": [
{
"deviceId": "<redacted>",
"timestamp": "2022-12-23T16:22:38Z"
}
],
"mainFirmwareVersion": "1.1.12",
"manufacturerName": "Schlage",
"modelName": "BR400",
"serialNumber": "1089293",
"wifiFirmwareVersion": "SD878x-14.76.36.p121-702.1.0-WM"
},
"connected": true,
"connectivityUpdated": "2022-12-23T16:20:13.000Z",
"created": "2022-08-13T03:21:47.000Z",
"deviceId": "b6<redacted>",
"devicetypeId": "br400",
"lastUpdated": "2022-12-23T16:20:13.000Z",
"modelName": "BR400",
"name": "My Home",
"physicalId": "1089293",
"relatedDevices": [
{
"deviceId": "b6<redacted>"
}
],
"role": "owner",
"serialNumber": "<redacted>",
"users": [
{
"email": "r<redacted>",
"friendlyName": "R<redacted>",
"identityId": "6e2<redacted>",
"role": "owner"
}
]
}
]
and from /devices?archetype=lock
[
{
"CAT": "5820834319200146081a27d2abc1420c0050cd939c01db1293d1b6ed2234a3fb5905",
"SAT": "582182431930014a0048ba67a2f65c2b742750f54e5626c546dd745091b25e44249f3c",
"attributes": {
"CAT": "5820834319200146081a27d2abc1420c0050cd939c01db1293d1b6ed2234a3fb5905",
"SAT": "582182431930014a0048ba67a2f65c2b742750f54e5626c546dd745091b25e44249f3c",
"accessCodeLength": 4,
"adminOnlyEnabled": 0,
"alarmSelection": 0,
"alarmSensitivity": 0,
"alarmState": 0,
"autoLockTime": 240,
"batteryLevel": 66,
"batteryLowState": 0,
"beeperEnabled": 1,
"hardwareVersion": "1.3.0",
"lastTalkedTime": "2022-12-20T22:46:11Z",
"lockAndLeaveEnabled": 1,
"lockState": 1,
"macAddress": "EA:10:CA:87:19:F6",
"mainFirmwareVersion": "004.031.000",
"manufacturerName": "Schlage ",
"modelName": "BE479CEN619",
"name": "Front Door",
"profileVersion": "1.1",
"serialNumber": "<redacted>6",
"timezone": -60
},
"connected": false,
"connectivityUpdated": "2022-12-20T23:02:35.000Z",
"created": "2021-03-03T20:19:18.000Z",
"deviceId": "<redacted>",
"devicetypeId": "be479",
"lastUpdated": "2022-12-20T23:02:35.000Z",
"macAddress": "EA:10:CA:87:19:F6",
"modelName": "BE479CEN619",
"name": "Front Door",
"physicalId": "ea:10:ca:87:19:f6",
"relatedDevices": [
{
"deviceId": "<redacted>"
}
],
"role": "owner",
"serialNumber": "0<redacted>6",
"timezone": -60,
"users": [
{
"email": "<redacted>",
"friendlyName": "<redacted>",
"identityId": "<redacted>",
"role": "admin"
},
{
"email": "<redacted>",
"friendlyName": "Home Assistant",
"identityId": "<redacted>",
"role": "guest"
},
{
"email": "m<redacted>",
"friendlyName": "M<redacted>",
"identityId": "<redacted>",
"role": "guest"
},
{
"email": "r<redacted>",
"friendlyName": "R<redacted>",
"identityId": "6e2<redacted>",
"role": "owner"
}
]
}
]
I’ve redacted Identity IDs and device IDs just in case, and also names and email addresses.
I would hope there is filtering between accounts that would block someone from adding my device ID with their credentials to open my lock.
I did notice that I could transplant the identityID of another user from my account and it would operate the lock, and show that name in the history. That might be because I was logged in as the owner when I captured the Authorization Bearer. I’ll have to test with the guest account.