Entitlements Overview

The Entitlements Engine is powered by the isEntitledTo query and is designed to manage and control user access within your application. It enables you to grant users specific roles, permissions, feature access, and more, providing a flexible framework for access management.

Below is an overview of API endpoints relevant to managing features, plans, feature flags, and API access control within your application. All endpoints are classified as Management Endpoints, requiring environment-level authorization and offering comprehensive control over entitlement resources.

Languages
Servers
EU Region
https://api.frontegg.com/entitlements/
US Region
https://api.us.frontegg.com/entitlements/
CA Region
https://api.ca.frontegg.com/entitlements/
AU Region
https://api.au.frontegg.com/entitlements/
Frontegg sub-domain for use with user tokens
https://{domain}.frontegg.com/entitlements/

Features

Operations

Plans

Operations

Get Plan Features

Request

Retrieve a paginated list of plan features, with the abillity to search and order (by date (createdAt) or expiration date (expirationDate))

Path
idstringrequired
Query
offsetnumber

Page offset of the results to return

Default 0
Example: offset=0
limitnumber

Number of results per page

Default 10
Example: limit=10
filterstring

Search input; Searchable fields: name

Example: filter=search-text
orderBystring

Order fields by date created (createdAt) or expired (expirationDate)

Enum"name""key""createdAt"
Example: orderBy=key
sortTypestring

Sort fields by an ascending (ASC) or a decending (DESC) order

Enum"ASC""DESC"
Example: sortType=ASC
featureIdsArray of strings

Comma separated feature IDs that can be used to filter the results

Example: featureIds=e6a5012c-cbeb-4c1e-ab80-e5f43efd44e3
permissionKeysArray of strings

Comma separated permission keys that can be used to filter the results

Example: permissionKeys=permission.read&permissionKeys=permission.write
hasFeatureFlagboolean

Filter out features that are linked/not linked to feature-flag

Example: hasFeatureFlag=flase
featureKeysArray of strings

Comma separated feature Keys that can be used to filter the results

Example: featureKeys=test-feature
curl -i -X GET \
  'https://api.frontegg.com/entitlements/resources/plans/v1/{id}/features' \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>'

Responses

Bodyapplication/json
itemsArray of objects(PlanFeatureDto)
hasNextboolean
Response
application/json
{ "items": [ { … } ], "hasNext": true }

Link Features to Plan

Request

Link features to plan

Path
idstringrequired
Bodyapplication/jsonrequired
featuresIdsArray of stringsrequired

Array of UUID strings that represents the feature ID

Example: "e6a5012c-cbeb-4c1e-ab80-e5f43efd44e3"
curl -i -X PATCH \
  'https://api.frontegg.com/entitlements/resources/plans/v1/{id}/features/link' \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>' \
  -H 'Content-Type: application/json' \
  -d '{
    "featuresIds": "e6a5012c-cbeb-4c1e-ab80-e5f43efd44e3"
  }'

Responses

Unlink Features from Plan

Request

Unlink features from a given plan

Path
idstringrequired
Bodyapplication/jsonrequired
featuresIdsArray of stringsrequired

Array of UUID strings that represents the feature ID

Example: "e6a5012c-cbeb-4c1e-ab80-e5f43efd44e3"
curl -i -X PATCH \
  'https://api.frontegg.com/entitlements/resources/plans/v1/{id}/features/unlink' \
  -H 'Authorization: Bearer <YOUR_JWT_HERE>' \
  -H 'Content-Type: application/json' \
  -d '{
    "featuresIds": "e6a5012c-cbeb-4c1e-ab80-e5f43efd44e3"
  }'

Responses

Entitlements

Operations

Feature Flags

Operations

API Access Control

Operations