Private
impersonatingCreate a supplier user group Check out the docs for more info
ID of the supplier.
Required fields: Name
Delete a supplier user group Check out the docs for more info
ID of the supplier.
ID of the user group.
Delete a supplier user group user assignment Check out the docs for more info
ID of the supplier.
ID of the user group.
ID of the user.
Retrieve a supplier user group Check out the docs for more info
ID of the supplier.
ID of the user group.
List supplier user groups Check out the docs for more info
ID of the supplier.
Optional
filters?: FiltersAn object or dictionary representing key/value pairs to apply as filters. Valid keys are top-level properties of the returned model or 'xp.???'
Optional
page?: numberPage of results to return. When paginating through many items (> page 30), we recommend the "Last ID" method, as outlined in the Advanced Querying documentation.
Optional
pageNumber of results to return per page.
Optional
search?: stringWord or phrase to search for.
Optional
searchComma-delimited list of fields to search on.
Optional
sortComma-delimited list of fields to sort by.
List supplier user group user assignments Check out the docs for more info
ID of the supplier.
Optional
page?: numberPage of results to return. When paginating through many items (> page 30), we recommend the "Last ID" method, as outlined in the Advanced Querying documentation.
Optional
pageNumber of results to return per page.
Optional
userID of the user group.
Optional
userID?: stringID of the user.
Partially update a supplier user group Check out the docs for more info
ID of the supplier.
ID of the user group.
Create or update a supplier user group If an object with the same ID already exists, it will be overwritten. Check out the docs for more info
ID of the supplier.
ID of the user group.
Required fields: Name
Create or update a supplier user group user assignment Check out the docs for more info
ID of the supplier.
Required fields: UserGroupID, UserID
Generated using TypeDoc
Description
enables impersonation by calling the subsequent method with the stored impersonation token
Example