Private impersonatingCreate a supplier user group Check out the docs for more info
ID of the supplier.
Required fields: Name
Delete a supplier user group Check out the docs for more info
ID of the supplier.
ID of the user group.
Delete a supplier user group user assignment Check out the docs for more info
ID of the supplier.
ID of the user group.
ID of the user.
Retrieve a supplier user group Check out the docs for more info
ID of the supplier.
ID of the user group.
List supplier user groups Check out the docs for more info
ID of the supplier.
Optional filters?: FiltersAn object or dictionary representing key/value pairs to apply as filters. Valid keys are top-level properties of the returned model or 'xp.???'
Optional page?: numberPage of results to return. When paginating through many items (> page 30), we recommend the "Last ID" method, as outlined in the Advanced Querying documentation.
Optional pageNumber of results to return per page.
Optional search?: stringWord or phrase to search for.
Optional searchComma-delimited list of fields to search on.
Optional sortComma-delimited list of fields to sort by.
List supplier user group user assignments Check out the docs for more info
ID of the supplier.
Optional page?: numberPage of results to return. When paginating through many items (> page 30), we recommend the "Last ID" method, as outlined in the Advanced Querying documentation.
Optional pageNumber of results to return per page.
Optional userID of the user group.
Optional userID?: stringID of the user.
Partially update a supplier user group Check out the docs for more info
ID of the supplier.
ID of the user group.
Create or update a supplier user group If an object with the same ID already exists, it will be overwritten. Check out the docs for more info
ID of the supplier.
ID of the user group.
Required fields: Name
Create or update a supplier user group user assignment Check out the docs for more info
ID of the supplier.
Required fields: UserGroupID, UserID
Generated using TypeDoc
Description
enables impersonation by calling the subsequent method with the stored impersonation token
Example