User
Method summary
name | description |
---|---|
getAuthorities | The authorities granted to this user. |
getAuthorityGroups | The authority groups this user belongs to. |
getEmail | Get the email entered for the user or an empty string if none provided |
getFirstName | The first name of this user. |
getFullName | The full name of this user, consisting of their first and last names. |
getId | The id of this user. |
getLastName | The last name of this user. |
Methods
- getAuthorities ( ) → {Array.<string>}
-
The authorities granted to this user.
Returns:Type Description Array.<string> The authorities granted to this user - getAuthorityGroups ( ) → {Array.<string>}
-
The authority groups this user belongs to.
Returns:Type Description Array.<string> The authority groups this user belongs to - getEmail ( ) → {string}
-
Get the email entered for the user or an empty string if none provided
Returns:Type Description string The email address of the user or an empty string if none provided - getFirstName ( ) → {string}
-
The first name of this user.
Returns:Type Description string The first name of this user - getFullName ( ) → {string}
-
The full name of this user, consisting of their first and last names.
Returns:Type Description string The full name of this user - getId ( ) → {string}
-
The id of this user.
Returns:Type Description string The id of this user - getLastName ( ) → {string}
-
The last name of this user.
Returns:Type Description string The last name of this user
© 2001-2025 Fair Isaac Corporation. All rights reserved. This documentation is the property of Fair Isaac Corporation (“FICO”). Receipt or possession of this documentation does not convey rights to disclose, reproduce, make derivative works, use, or allow others to use it except solely for internal evaluation purposes to determine whether to purchase a license to the software described in this documentation, or as otherwise set forth in a written software license agreement between you and FICO (or a FICO affiliate). Use of this documentation and the software described in it must conform strictly to the foregoing permitted uses, and no other use is permitted.