Integration Guide for Banks
[ENG] Integration Guide for Bank
[ENG] Integration Guide for Bank
  • General
    • 💰Overview
      • Transfers between digitized entities
        • Option 1. Fast transfer
        • Option 2. Standard transfer (optional)
      • Version history
      • API change log
      • Glossary
    • 🌐Common requirements
    • 👉Basic use case
    • 📅Integration Plan
      • Integration Plan - Business
      • Integration Plan - Technical Team
      • Multisignature
    • ❗Error messages
  • 🛠️API methods
    • Authentification
      • Authorization via JWT
      • Bank authorization
      • JWT format
    • Emlpoyee
      • How to add a user to a role
      • Role management
    • Customer
      • Segments
    • Digital entity
    • Identifiers
    • Transfer
      • Multisignature for transfers
      • [optional] Callbacks
      • Category
    • Limits
    • Reconciliation
    • [optional] Branch
      • Branch access
      • How to add employee to branch
      • Filter by branch
      • Transfers (branches)
      • Branch digital entity
Powered by GitBook
On this page
  1. API methods
  2. [optional] Branch

Branch access

Previous[optional] BranchNextHow to add employee to branch

Last updated 1 year ago

To configure employee access to branches, it is necessary to use these endpoints. These endpoints are designed to enable the establishment and management of permissions within the branch system, ensuring that employees are granted appropriate levels of access based on their branch roles and responsibilities.

Add role permission to branch access

Remove role permission from branch access

Get roles with branch access permissions for table

Create role for branch access

Delete role for branch access

Get branch access scopes

Get users list

Add user to branch access role

Remove user from branch access role

Check branch permission for user guid

🛠️

Get roles with branch access permissions for table

get

Get roles with branch access permissions for table

Path parameters
counterparty_guidstringRequired

Counterparty GUID

branch_guidstringRequired

branch guid (uuid)

Query parameters
role_namesstring[]Optional

account kinds (string)

Responses
200
OK
application/json
400
json with error msg
application/json
get
GET /api/v1/counterparty/{counterparty_guid}/branch/{branch_guid}/permission/table HTTP/1.1
Host: your_host
Accept: */*
{
  "roles": [
    "text"
  ],
  "rows": [
    {
      "group_lang_key": "text",
      "group_name": "text",
      "permissions": [
        {
          "guid": "text",
          "name": "text",
          "name_lang_key": "text",
          "roles": [
            {
              "allowed": true,
              "name": "text"
            }
          ],
          "sort_number": 1
        }
      ],
      "sort_number": 1
    }
  ]
}

Get branch access scopes

get

Get branch access scopes

Path parameters
counterparty_guidstringRequired

Counterparty GUID

Responses
200
OK
application/json
400
json with error msg
application/json
get
GET /api/v1/counterparty/{counterparty_guid}/branches-access/scope HTTP/1.1
Host: your_host
Accept: */*
{
  "branches_access_list": [
    {
      "access": "text",
      "branch_guid": "text"
    }
  ]
}

Get users list

get

Get users list

Path parameters
counterparty_guidstringRequired

Counterparty GUID

Query parameters
role_namestringOptional

role name (string)

limitstringOptional

limit (int64)

page_tokenstringOptional

page token (int64)

Responses
200
OK
application/json
400
json with error msg
application/json
get
GET /api/v1/counterparty/{counterparty_guid}/branches-access/user HTTP/1.1
Host: your_host
Accept: */*
[
  {
    "page_token": "text",
    "users": [
      {
        "guid": "text",
        "role_name": "text"
      }
    ]
  }
]
  • Add role permission to branch access
  • POSTAdd role permission to branch access
  • Remove role permission from branch access
  • DELETERemove role permission from branch access
  • Get roles with branch access permissions for table
  • GETGet roles with branch access permissions for table
  • Create role for branch access
  • POSTCreate role for branch access
  • Delete role for branch access
  • DELETEDelete role for branch access
  • Get branch access scopes
  • GETGet branch access scopes
  • Get users list
  • GETGet users list
  • Add user to branch access role
  • POSTAdd user to branch access role
  • Remove user from branch access role
  • DELETERemove user from branch access role
  • Check branch permission for user guid
  • POSTCheck branch permission for user guid

Add role permission to branch access

post

Add role permission to branch access

Path parameters
counterparty_guidstringRequired

Counterparty GUID

Body
branch_guidstringOptional

branch's guid

permission_guidstringOptional

permission's guid for permission what you need to add to role

role_namestringOptional

role's name

Responses
200
OK
application/json
Responseobject
400
json with error msg
application/json
post
POST /api/v1/counterparty/{counterparty_guid}/branches-access/permission HTTP/1.1
Host: your_host
Content-Type: application/json
Accept: */*
Content-Length: 66

{
  "branch_guid": "text",
  "permission_guid": "text",
  "role_name": "text"
}
{}

Remove role permission from branch access

delete

Remove role permission from branch access

Path parameters
counterparty_guidstringRequired

Counterparty GUID

Body
branch_guidstringOptional

branch's guid

permission_guidstringOptional

permission's guid for permission what you need to remove to role

role_namestringOptional

role's name

Responses
200
OK
application/json
Responseobject
400
json with error msg
application/json
delete
DELETE /api/v1/counterparty/{counterparty_guid}/branches-access/permission HTTP/1.1
Host: your_host
Content-Type: application/json
Accept: */*
Content-Length: 66

{
  "branch_guid": "text",
  "permission_guid": "text",
  "role_name": "text"
}
{}

Create role for branch access

post

Create role for branch access

Path parameters
counterparty_guidstringRequired

Counterparty GUID

Body
branch_guidstringOptional

BranchGUID where should be created the role

role_namestringOptional

role's name

Responses
200
OK
application/json
Responseobject
400
json with error msg
application/json
post
POST /api/v1/counterparty/{counterparty_guid}/branches-access/role HTTP/1.1
Host: your_host
Content-Type: application/json
Accept: */*
Content-Length: 41

{
  "branch_guid": "text",
  "role_name": "text"
}
{}

Delete role for branch access

delete

Delete role for branch access

Path parameters
counterparty_guidstringRequired

Counterparty GUID

Body
role_namestringOptional

role's name

Responses
200
OK
application/json
Responseobject
400
json with error msg
application/json
delete
DELETE /api/v1/counterparty/{counterparty_guid}/branches-access/role HTTP/1.1
Host: your_host
Content-Type: application/json
Accept: */*
Content-Length: 20

{
  "role_name": "text"
}
{}

Add user to branch access role

post

Add user to branch access role

Path parameters
counterparty_guidstringRequired

Counterparty GUID

Body
role_namestringOptional

role's name

user_guidstringOptional

employee's guid

Responses
200
OK
application/json
Responseobject
400
json with error msg
application/json
post
POST /api/v1/counterparty/{counterparty_guid}/branches-access/user HTTP/1.1
Host: your_host
Content-Type: application/json
Accept: */*
Content-Length: 39

{
  "role_name": "text",
  "user_guid": "text"
}
{}

Remove user from branch access role

delete

Remove user from branch access role

Path parameters
counterparty_guidstringRequired

Counterparty GUID

Body
role_namestringOptional

role's name

user_guidstringOptional

employee's guid

Responses
200
OK
application/json
Responseobject
400
json with error msg
application/json
delete
DELETE /api/v1/counterparty/{counterparty_guid}/branches-access/user HTTP/1.1
Host: your_host
Content-Type: application/json
Accept: */*
Content-Length: 39

{
  "role_name": "text",
  "user_guid": "text"
}
{}

Check branch permission for user guid

post

Check branch permission for user guid

Body
branches_accessall ofOptional

BranchesAccess struct for host branch unique scope

counterparty_guidstringOptional

CounterpartyGUID specify counterparty

counterparty_jwtstringOptional

CounterpartyJWT

permissionstringOptional

Permission level of permission

user_guidstringOptional

UserGUID identity id

Responses
200
allowed
application/json
400
json with error msg
application/json
403
not allowed
application/json
post
POST /api/v1/access/branches HTTP/1.1
Host: your_host
Content-Type: application/json
Accept: */*
Content-Length: 150

{
  "branches_access": {
    "access": "text",
    "branch_guid": "text"
  },
  "counterparty_guid": "text",
  "counterparty_jwt": "text",
  "permission": "text",
  "user_guid": "text"
}
{
  "allowed": true
}