Technical Articles
This section contains technical articles and white papers on topics of interest to developers and implementers.
Contents
- Education Agency Business Process Security Considerations (wiki)
- Guidance on Multi-Year Data in ODS (wiki)
- Identities API (wiki)
- Key Structure in the Ed-Fi ODS / API (wiki)
- ODS / API Composite Resources Technical Approach (wiki)
- Securing OAuth Secrets (wiki)
- Unique ID System Integration (wiki)
- Working with Code Generation (wiki)
- Running the Postman Integration Tests (wiki)
- Adding Custom ODS / API Features (wiki)
- Cascading Key Updates on ODS API Resources
- Authorizing Requests Using Custom Database Views
📄️ Education Agency Business Process Security Considerations
No connected technology solution is without risk. This article provides essential
📄️ Guidance on Multi-Year Data in ODS
This article provides essential information for education agencies and other
📄️ Identities API
The Ed-Fi Identities API provides an abstraction wrapper for an optional native
📄️ Key Structure in the Ed-Fi ODS / API
Introduction
📄️ ODS / API Composite Resources Technical Approach
As part of the evolution of the Ed-Fi ODS / API from primarily supporting data collection use cases to a widening set of data integration use cases, a mechanism is needed for exposing Composite Resources. A Composite
📄️ Securing OAuth Secrets
A secure password storage strategy is critical to mitigating data breaches. This
📄️ Unique ID System Integration
Generally speaking, a unique ID system ensures that a person has only one unique
📄️ Working with Code Generation
The Code Generation utility is a .NET 8.0 command-line application that has been
📄️ Running the Postman Integration Tests
The Ed-Fi ODS / API includes several collections of Postman tests that can be
📄️ Adding Custom ODS / API Features
The Ed-Fi ODS / API comes with a set of configurable features that can be
📄️ Cascading Key Updates on ODS / API Resources
The Ed-Fi ODS SQL Server data store allows for the configuration of Cascading
📄️ Authorizing Requests Using Custom Database Views
The relationship-based authorization strategies used in the API are implemented