Get "info admin only" settings

Check if only admins can update group info.

GET
https://api.wawp.net/v2/groups/{id}/settings/security/info-admin-only?access_token=123456789&id=1234567890%40g.us&instance_id=123456789

Authentication Required

Login to swap the placeholders with your real Instance ID and Access Token.

Log In
Test /v2/groups/{id}/settings/security/info-admin-only endpoint
GET
GET

No query parameters required

This endpoint doesn't expect data in the URL.

Best practices

  • Verify this setting before attempting to change the Subject or Icon.

  • Keep this restricted on official announcement groups.

Governance Auditing: The Verification of Metadata Integrity

In the management of high-sensitivity conversational environments, trust must be verified as much as it is established. The Get Info Admin Only endpoint is your primary tool for Structural Governance Auditing and Compliance Verification. It allows your automated systems to programmatically query the "Lock" state of a group's visual and textual identity. By understanding whether a group is currently restricted to administrators or open to all participants for metadata changes, your system can make informed decisions about its moderation posture, its branding enforcement logic, and its overall risk assessment for that specific community.

For enterprise architects, this endpoint is the Pulse Check of Brand Protection. This guide explores the strategic imperatives of security auditing and the guardianship of shared context.


🏗️ Architectural Philosophy: Retrieving the Structural Permission Mask

From a technical perspective, the Get Info Admin Only endpoint is a Security State Resolver.

Key Architectural Objectives:

  • The Baseline of Brand Integrity: A professional business channel should almost always be "Locked" for metadata changes. This endpoint provides the definitive answer to the question: "Is our brand identity currently protected from unauthorized changes?" By retrieving the current boolean state, your system can identify "At-Risk Groups" that have been accidentally or maliciously opened up to participant-led branding.
  • Permissionless Verification: Any member of a group (even if they are not an admin) can query its security settings. This allows your system to monitor groups where it is a regular participant, providing a "Monitoring-from-Within" capability that doesn't require elevated privileges to function.
  • Low-Overhead State Mapping: Because only a single boolean flag is retrieved, this API call is extremely lightweight. It is the perfect trigger for a "Watchdog Utility" that scans hundreds of groups per minute to ensure they all adhere to your organization's security baseline.

🚀 Strategic Use Case: Compliance Monitoring and Anti-Tamper Auditing

Visibility into security settings is the foundation of automated correction.

1. The "Governance Watchdog" Reconciliation

In large-scale operations with multiple human admins, it is common for one admin to manually change a group's settings from their phone (e.g., to allow a client to upload a specific photo) and then forget to re-lock the group. Your system should use the Get Info Admin Only endpoint to perform a "Daily Compliance Scan." If a group is found to be unlocked (adminOnly: false) when your internal policy mandates a lock, the system can automatically flag the group or even Re-Lock it to restore the authorized posture.

2. Risk-Aware Message Orchestration

Before sending a message that contains high-value instructions (e.g., a link to an official payment portal), your system should verify the group's "Integrity State." If the group info settings are unlocked, there is a risk that a malicious participant has renamed the group or changed its description to something deceptive. By probing the security state first, your system can decide to refuse to send sensitive information until the group is secured, protecting both your brand and your customers from social engineering.

3. Dynamic Moderator Dashboarding

For the human agents managing your communities, the security state of a group is a critical piece of context. Displaying the "Lock Icon" in your CRM's dashboard—driven by the data from this endpoint—gives the agent instant situational awareness. They know at a glance whether they have absolute control over the group's "Face" or whether they need to monitor for unauthorized metadata tampering.


🔐 Administrative Mandate: The Guardianship of Brand Identity

In an enterprise setting, the "About" section and the Group Icon are corporate assets. Controlling access to them is a regulatory requirement.

Integrity in Regulated Industries

For sectors like Finance or Healthcare, maintaining a static, verifiable group state is essential for audit trails. Auditors must be able to see that your organization maintained a "Locked" posture for its entire duration. The Get Info Admin Only endpoint provides the raw evidence for your "Audit Export"—proving that your system was actively monitoring and verifying the security boundary of its conversational workspaces.

Protecting the "Source of Truth"

The group description often hosts critical SOPs and bot commands. If the info settings are unlocked, that "Document" is vulnerable. By programmatically verifying the lock state, your system ensures that the information it provide to users remains the definitive, untampered truth. Verification is the final step in the chain of administrative trust.


🛡️ Operational Best Practices: Consistency and Periodic Verification

  • The "Initialization Audit": Immediately after joining a group or being promoted, your system should call this endpoint to understand its new environment. Don't assume the group is locked; verify it.
  • Automated Policy Reporting: Generate a weekly report for your security team showing the "Governance Compliance" percentage across all active groups. This high-level visibility is made possible by the aggregate data retrieved from this endpoint.
  • Synchronize with Webhooks: While group.update webhooks tell you when a change happens, the Get Info Admin Only endpoint tells you what the state is. During system recovery or after a network partition, skip the webhook history and call the GET API to reconcile your local state with the network truth.

⚙️ Engineering Best Practices: The Validation Loop

  1. Map Logic to Boolean States: Ensure your internal state machine understands that adminOnly: true corresponds to a "Governed" state and false to an "Expressive" or "Collaborative" state.
  2. Handle Network Lag: Like all metadata reads, the response represents the state at the exact moment of the call. If your system is performing a "Sync-and-Lock" loop, wait for a few hundred milliseconds after a Set call before verifying via the GET API.
  3. Cross-Reference with Role Power: A "Locked" group is only secure if your Wawp instance (or a trusted human) is an admin. We recommend a Get Admin Only -> Get Participant Role sequence to build a complete picture of the group's current governance posture.

🎯 Conclusion: Mastering the Art of the Audited Community

The Get Info Admin Only endpoint is the "Integrity Monitor" of your community architecture. It is your most powerful tool for verifying that your brand identity is protected, your compliance mandates are met, and your communities are operating within a structured, professional framework. By treating the "Lock" state as a critical metric to be audited rather than assumed, you build a conversational ecosystem that is resilient to tampering and always aligned with your organization's standards of quality. You move beyond "Passive Presence" and into the world of Active Governance Verification, where every community operates under the watchful, informed eye of your automated business logic.

Request Parameters

Configure the parameters required to interact with this endpoint. All query and body arguments are listed below with their details.

URL Parameters

Passed in the URL query string
string

Your unique WhatsApp Instance ID

Example:
string

Your API Access Token

Example:
string

The unique ID of the group

Example:

Request Samples

Use these ready-to-go code snippets to integrate our API into your project quickly and efficiently. Choose your preferred language and library.

1const baseUrl = "https://api.wawp.net";
2const endpoint = "/v2/groups/1234567890@g.us/settings/security/info-admin-only";
3const params = new URLSearchParams({
4 "instance_id": "123456789",
5 "access_token": "123456789"
6}).toString();
7
8
9fetch(`${baseUrl}${endpoint}${params ? '?' + params : ''}`, {
10 method: "GET",
11 headers: { "Content-Type": "application/json" },
12
13})
14 .then(async (response) => {
15 if (response.ok) {
16 const data = await response.json();
17 console.log("Success:", data);
18 return data;
19 }
20
21 // Error Handling
22
23
24 const errorText = await response.text();
25 console.error(`Error ${response.status}: ${errorText}`);
26 })
27 .catch((error) => console.error("Network Error:", error));
Interactive Samples
Ln 27, Col 1javascript

Expected Responses

Explore all possible responses and outcomes from the server. We have documented each status code with data examples to make success and error handling easier.

Setting retrieved
application/json
boolean *

Example

{
"adminOnly": true
}

Command Palette

Search for a command to run...