## Revoke all Access tokens for a user `zero_trust.organizations.revoke_users(OrganizationRevokeUsersParams**kwargs) -> OrganizationRevokeUsersResponse` **post** `/{accounts_or_zones}/{account_or_zone_id}/access/organizations/revoke_user` Revokes a user's access across all applications. ### Parameters - `email: str` The email of the user to revoke. - `account_id: Optional[str]` The Account ID to use for this endpoint. Mutually exclusive with the Zone ID. - `zone_id: Optional[str]` The Zone ID to use for this endpoint. Mutually exclusive with the Account ID. - `devices: Optional[bool]` When set to `true`, all devices associated with the user will be revoked. - `devices: Optional[bool]` When set to `true`, all devices associated with the user will be revoked. - `user_uid: Optional[str]` The uuid of the user to revoke. - `warp_session_reauth: Optional[bool]` When set to `true`, the user will be required to re-authenticate to WARP for all Gateway policies that enforce a WARP client session duration. When `false`, the user’s WARP session will remain active ### Returns - `Literal[true, false]` - `true` - `false` ### Example ```python import os from cloudflare import Cloudflare client = Cloudflare( api_token=os.environ.get("CLOUDFLARE_API_TOKEN"), # This is the default and can be omitted ) response = client.zero_trust.organizations.revoke_users( email="test@example.com", account_id="account_id", ) print(response) ``` #### Response ```json { "result": true, "success": true } ```