This document describes the Transcripts of Records API. This API is implemented by the receiving institution. It allows the sending institution to retrieve Transcripts of Records issued by the receiving institution.
The transcript in this API has its own identifier, created by the receiving institution. This allows to send transcripts without former exchange of mobilities via Outgoing Mobilities API.
Note that all the transcripts that we write about here are actually related to student mobilities.
We have also another API, which allows to send transcripts - Incoming Mobility Transcripts of Records API. In that API, the transcript is identified by the mobility id - the one assigned by the sending institution. This means, that Incoming Mobility ToRs API can be used only for those mobilities, which have been exchanged via Outgoing Mobilities API before.
If the institution implements both ToR APIs, one transcript of records can be accessed in two ways. However, if the mobility has been exchanged via Outgoing Mobilities API, the Incoming Mobility Transcripts of Records API should be the preferred way, as the caller can there easily and unambiguously (maybe even automatically) match the transcript with the mobility and the student.
Note that all the transcripts exchanged via Transcript of Records API are actually related to student mobilities as well. In this API they are only being sent without the context of the mobility.
This version of this API uses standard EWP Authentication and Security, Version 2. Server implementers choose which security methods they support by declaring them in their Manifest API entry.
This API handles data which is considered private. Server implementers are allowed to forbid less-secure methods of authentication and encryption for this API (by dropping support for them). Currently, we leave it for the server implementers to decide which methods are "secure enough". These recommendations MAY change in the future.
Only selected Transcripts of Records should be accessible to the caller:
-
If a ToR has not been approved as "ready for recognition" yet, then it SHOULD NOT be accessible via this API (see discussion here).
-
If the caller covers the sending HEI of the given mobility, then he MUST be allowed read access to the mobility's corresponding ToR.
-
If the caller covers the receiving HEI (yourself) of the given mobility, then he MAY be allowed read access to the mobility's corresponding ToR. (It seems reasonable to do so, but we leave this decision to your team.)
-
All other callers SHOULD NOT be allowed to view the ToR.
-
Note, that servers will need to verify these access rights for each ID on the
tor_id
list. It is possible that the caller has access to only some of the mobilities. (If this seems problematic, then you can always simply set your<max-tor-ids>
to1
.)
Server implementers MUST:
- Implement the
get
endpoint. - Implement the
index
endpoint. - Put the URLs of these endpoints in their manifest file, as described in manifest-entry.xsd.
The details on each of these endpoints are described on separate pages of this API specification (use the links above).