http_api

Syndicate content
How to Return ALL of the columns

Specify the value a in the clist param to get all the columns returned.

October 13th, 2009 - 1:10 PM
Sort List (slist) Parameter

Sort List (slist) Parameter

The slist determines the order in which the returned records are displayed. Heres what an slist looks like:

<slist>7</slist>

October 13th, 2009 - 1:10 PM
Options Parameter

You use the options parameter to further control the return of records. You can use any or all of the options, separating the options with a period. Here are the available options:

October 13th, 2009 - 1:10 PM
Moving Users in and out of Roles

You can use API_UserRoles to get all the users that are in roles for your application, along with all of the roles for each user.

October 13th, 2009 - 1:10 PM
Building and Using Queries

API_GenResultsTable: both of which are covered in the language reference section.

Both API_DoQuery and API_GenResultsTable make use of the same query mechanism to return data. They differ mainly in the overall format of the return:

October 13th, 2009 - 1:10 PM
How QuickBase Views and Reports Relate to Queries

In the QuickBase UI, retrieved records are displayed in rows in a table, with the field data layed out in separate columns. This layout of record data is called a view.

October 13th, 2009 - 1:10 PM
Is There a Default View or Must I Construct a View?

Is There a Default View or Must I Construct a View?

October 13th, 2009 - 1:10 PM
How to Use Tickets: Tickets vs. Username and Password

If a user is accessing a QuickBase application through a web browser, once the call to API_Authenticate has been made successfully, the ticket cookie will be used automatically: there is no need to explicitly supply the ticket value as returned in the XML.

October 13th, 2009 - 1:10 PM
User Access and Your Application

This chapter covers the APIs application-level features that govern access. The calls that provide these features can be grouped as follows:

October 13th, 2009 - 1:10 PM
How Compromised Security Situations are Handled

If some user uses someone elses application token, and there is a complaint about this being unauthorized, the offending user will have access rights removed and the application token will be revoked.

October 13th, 2009 - 1:10 PM

© 1997-2014 Intuit Inc. All Rights Reserved.

Online Database VeriSign Secured Web Based Software TRUSTe Certification Online Database SSAE Audit