This site requires JavaScript to be enabled
Welcome Guest|
Recent searches
IE BUMPER

TED Access Level, Restricted Data Access, and Query Limits

Number of views : 8
Article Number : KB0013301
Published on : 2021-10-20
Last modified : 2021-10-20 15:04:18
Knowledge Base : IT Public Self Help


Access Level Description
Authentication1 The system will use the information in TED in order to authenticate (i.e. log in) users. (Entries marked “Auth” in the TED Directory Schema and Data Attributes.)
Public The system only needs access to public directory information about individuals. (Entries marked “Public” in the TED Directory Schema and Data Attributes.)
Standard The system needs access to a wide variety of attributes or any of the restricted data below.


Restricted Data Access Description
Restricted Student Records2 Access to records of students whose full directory entries are restricted.
Restricted Student Data2 Access to home phone, home address, major, college, and classification for students who have restricted the release of that information.
Student Class Information2 Access to student course numbers and class unique numbers.
Student Legal Name2 Access to Student legal name information.
Restricted Employee Records2 Access to records of employees whose full directory entries are restricted.
Restricted Employee Data2 Access to home phone and home address for employees who have restricted the release of that information.
Employee Legal Name2 Access to Employee legal name information.
ID Card Number2 Access to ID Card number (from the magnetic strip).
Badge ID2 Badge number from ID cards (from the proximity chip).


Query Limit Attributes Description
Default
Searches return a maximum of 5,000 records and can run for a maximum of 30 seconds                                                                        
High Volume3
Searches return a maximum of 150,000 records and can run for a maximum of 15 minutes


Footnotes:

1: It is strongly recommended that, if possible, you use Enterprise Authentication for your authentication needs.

2: Requests for this data requires approval from the respective data owners.

3: High volume requests requires pre-approval from the TED service owners.




Thank You! Your feedback has been submitted.

Feedback