Open redtrinity opened 8 months ago
After further digging, it seems that for this specific circumstance, the employee record in question was:
LDAP/SAML > [portal] > Users
configuredIt seems the error message in this specific circumstance is a red herring.
Looking at the logic behind the SetKioskUserRoles
and AddKioskUserRoles
endpoints, the key to determining whether a user_code
is invalid is whether that user_code
matches the teacher's "Teacher Code" in TASS (for teaching staff) or their 'Employee Code' for non-teaching staff.
The email address isn't specifically used by the SetKioskUserRoles
or AddKioskUserRoles
endpoints but perhaps you require it being present in your sync processes as a key between TASS and your other systems?
Let me know if there is anything else I can do to investigate this further for you.
Hey Leon, thanks for that info. That's quite odd as when we do the API calls we're very careful to ensure to use the TASS emp_code
for non-teaching staff (that is employees with no teacher record) and the tch_code
for staff that do have teacher records.
If/when I have further time to do more testing I'll update with the test process and results.
One further note, there are a few combinations of teachers/employees that might affect the logic. So in your testing take note of the user's teacher/employee combinations as we'll be able to analyse what is happening in more detail. i.e. Current Teacher & Current Employee, Current Teacher & Non-Current Employee, Non-Teaching & Current Employee, etc.
Hi,
When using the TASS IdM API’s (specifically the
SetKioskUserRoles
and/orAddKioskUserRoles
endpoints) to set or add permissions, we are seeing both endpoints returning a 'user_code(xxxxxxx) not in any group yet' error.See sample output below:
The employee (
0000xxx
) does not any security roles assigned because we’re relying on using the IdM API to automatically sort out adding relevant security roles for new/current employees as part of a nightly account management sync process.If we manually add a security role to the relevant employee, both API’s perform their respective action and either add or set the security roles as supplied in the API call.
The expected outcome is that either of these endpoints will perform the respective action on the provided user even if the user does not have existing roles.
References CS-232020.