1 © 2019 Citrix | Confidential
Citrix Workspace with
Microapps Essentials
​
Module 4
​
Citrix Workspace with HTTP Methods
2 © 2019 Citrix | Confidential
Learning
Objectives
• Describe the purpose of the POST method.
• Identify how a primary key is used.
• Explain the purpose of the PUT method.
• Discuss how to use the DELETE method.
3 © 2019 Citrix | Confidential
POST Method
4 © 2019 Citrix | Confidential
POST Request Method
GET⁞POST⁞PUT⁞DEL
POST is an HTTP request method used to
add new data information to the database.
That data is then POSTed and stored.
POST requests are used to send data to
the API server and create/add the new
resource.
POST WORKFLOW
API
CLIENT
User
SERVER APP
POST HTTP
REQUEST ADD NEW
DATA
API
NEW RESOURCE
ADDED SUCCESS
RESPONSE
1
2
3
4
5 © 2019 Citrix | Confidential
The POST method is often used when uploading a file or when submitting a form over the
web.
The POST requests that the server accepts new data as a new resource identified by the
Request-URI.
The URI in a POST request identifies the resource that will handle the data information.
POST Method
GET⁞POST⁞PUT⁞DEL
EXAMPLE 1: USING POST IN SEQUENCE
POST /device-management/devices : Create a new device
EXAMPLE 2: POST HTTP REQUEST URI
POST HTTP http://www.appdomain.com/users/123/accounts
6 © 2019 Citrix | Confidential
Lesson
Objective Review
This method is used to create a new resource
into a collection of resources in the System of
Record.
What is the purpose of the POST method?
7 © 2019 Citrix | Confidential
Primary Key
8 © 2019 Citrix | Confidential
Primary Key
• A primary key is an attribute in a
table that contains a unique
identifier.
• The primary key attribute column is
used to uniquely identify each
record or row in the table.
• The primary key is what delineates
each record and avoids changing
records for individuals who may
possess the same name.
• Some of the functions primary keys
are used for would be to access a
specific record, to avoid duplicating
records, to link records to multiple
tables, to index data in the table,
and to create dependencies just to
name a few.
Definition Function
9 © 2019 Citrix | Confidential
Primary Key
• In Postman, Citrix Workspace or any other API
development application, the primary key comes into play
when making an HTTP call, such as PUT or DELETE, for
example.
• This key indicates which record a call is made to because
the primary key is the record’s unique identifier, just like a
fingerprint, it identifies that record.
• It doesn’t matter how many people have the same name;
they are differentiated by a unique key.
10 © 2019 Citrix | Confidential
Lesson
Objective Review
Each record in the database is identified by a
unique identifier (primary key).
How is the primary key used?
11 © 2019 Citrix | Confidential
PUT Method
12 © 2019 Citrix | Confidential
The PUT method requests that
the data information that the
client is requesting to be
updated be stored under the
Request-URI.
Once the new resource is
updated, the origin server
returns a successful
completion response to the
client.
PUT Method
GET⁞POST⁞PUT⁞DEL
EXAMPLE 1: USING PUT IN SEQUENCE
PUT /device-management/devices/{id} : Update the device
information identified by "id”
EXAMPLE 2: REQUEST URIs
PUT HTTP http://www.appdomain.com/users/123/accounts/456
CLIENT
User
API
SERVER APP
Server
Diagram
13 © 2019 Citrix | Confidential
Lesson
Objective Review
The PUT methods is used when an update to a
record is made.
What is the purpose of the PUT method?
14 © 2019 Citrix | Confidential
DELETE Method
15 © 2019 Citrix | Confidential
DELETE Method
GET⁞POST⁞PUT⁞DEL
This is used to eliminate and
delete a resource or record
completely.
The DELETE method
requests that the origin
server eliminate the
resource identified by the
Request-URI.
EXAMPLE 2: REQUEST URIs
DELETE http://www.appdomain.com/users/123
DELETE http://www.appdomain.com/users/123/accounts/456
EXAMPLE 1: USING DELETE IN SEQUENCE
DELETE /device-management/devices/{id} : Delete device by "id“
16 © 2019 Citrix | Confidential
Lesson
Objective Review
DELETE method is only used when a record
needs to be eliminated from the database or to
delete a row in that table.
How would the DELETE method be used?
17 © 2019 Citrix | Confidential
​
Module 4
18 © 2019 Citrix | Confidential
Lab Exercise
• Exercise 4-1: POST – Using Postman to Add Data to SoR
• Exercise 4-2: POST – Using Citrix Workspace to Add Data to
SoR
• Exercise 4-3: PUT – Using Postman to Update Data in SoR
• Exercise 4-4: PUT – Using Citrix Workspace to Update Data
in SoR
• Exercise 4-5: DELTE – Using Postman to Remove Data from
SoR
• Exercise 4-6: DELETE – Using Citrix Workspace to Remove
Data from SoR
• Exercise 4-7: Notifications – Creating Notifications for
Actions
19 © 2019 Citrix | Confidential
Key Takeaways
• POST is an HTTP request method used to add new data
information to the database, which posts and stores the
new information.
• The primary key is the unique identifier that identifies a
record as a social security number does for people.
• In order to update data, use the PUT HTTP request
method, which updates the record and stores it.
• The DEL method is only used to eliminate a record and
must include the primary key in the header.
Citrix Workspaces HTTP Methods_v1.02.pptx

More Related Content

PPTX
CWS-206-1I_03_Web and Data Elements_v1.02.pptx
PPTX
REST Api Tips and Tricks
PDF
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
PPTX
POSTMAN.pptx
PDF
RESTful APIs and SBCs
PPTX
RESTful APIs and SBCs
PPTX
Citrix Workspace with Microapps essentials
PPTX
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
CWS-206-1I_03_Web and Data Elements_v1.02.pptx
REST Api Tips and Tricks
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
POSTMAN.pptx
RESTful APIs and SBCs
RESTful APIs and SBCs
Citrix Workspace with Microapps essentials
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014

Similar to Citrix Workspaces HTTP Methods_v1.02.pptx (20)

PPTX
APIs_ An Introduction.pptx
PPTX
API Design- Best Practices
PDF
POST/CON 2019 Workshop: Fundamentals
PDF
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
PDF
WWW2014 Overview of W3C Linked Data Platform 20140410
PPTX
PowerApps community call-March 2019
PPTX
API Development Essentials: REST, SOAP, GraphQL Explained
PPTX
Connecting SharePoint 2010 Service Applications with other Farms
PDF
Federated Authentication in a Campus System
PPTX
SCWCD : Session management : CHAP : 6
PDF
Salesforce connect
PPTX
Api Testing
PPTX
Api Testing
PDF
IRJET- Fast Phrase Search for Encrypted Cloud Storage
PPTX
Planning Your Migration to SharePoint Online #SPBiz60
PPTX
Azure AD B2C Webinar Series: Custom Policies Part 1
PPTX
Why we need open data? FMI Open Data on AWS
PDF
5675212318661411677_TRN4034_How_to_Migrate_to_Oracle_Autonomous_Database_Clou...
PDF
Recipes for API Ninjas
PDF
ALT-F1.BE : The Accelerator (Google Cloud Platform)
APIs_ An Introduction.pptx
API Design- Best Practices
POST/CON 2019 Workshop: Fundamentals
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
WWW2014 Overview of W3C Linked Data Platform 20140410
PowerApps community call-March 2019
API Development Essentials: REST, SOAP, GraphQL Explained
Connecting SharePoint 2010 Service Applications with other Farms
Federated Authentication in a Campus System
SCWCD : Session management : CHAP : 6
Salesforce connect
Api Testing
Api Testing
IRJET- Fast Phrase Search for Encrypted Cloud Storage
Planning Your Migration to SharePoint Online #SPBiz60
Azure AD B2C Webinar Series: Custom Policies Part 1
Why we need open data? FMI Open Data on AWS
5675212318661411677_TRN4034_How_to_Migrate_to_Oracle_Autonomous_Database_Clou...
Recipes for API Ninjas
ALT-F1.BE : The Accelerator (Google Cloud Platform)
Ad

Recently uploaded (20)

PDF
Hazard Identification & Risk Assessment .pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
HVAC Specification 2024 according to central public works department
PPTX
20th Century Theater, Methods, History.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
advance database management system book.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
Hazard Identification & Risk Assessment .pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
HVAC Specification 2024 according to central public works department
20th Century Theater, Methods, History.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
My India Quiz Book_20210205121199924.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
History, Philosophy and sociology of education (1).pptx
advance database management system book.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Introduction to pro and eukaryotes and differences.pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Computer Architecture Input Output Memory.pptx
TNA_Presentation-1-Final(SAVE)) (1).pptx
Ad

Citrix Workspaces HTTP Methods_v1.02.pptx

  • 1. 1 © 2019 Citrix | Confidential Citrix Workspace with Microapps Essentials ​ Module 4 ​ Citrix Workspace with HTTP Methods
  • 2. 2 © 2019 Citrix | Confidential Learning Objectives • Describe the purpose of the POST method. • Identify how a primary key is used. • Explain the purpose of the PUT method. • Discuss how to use the DELETE method.
  • 3. 3 © 2019 Citrix | Confidential POST Method
  • 4. 4 © 2019 Citrix | Confidential POST Request Method GET⁞POST⁞PUT⁞DEL POST is an HTTP request method used to add new data information to the database. That data is then POSTed and stored. POST requests are used to send data to the API server and create/add the new resource. POST WORKFLOW API CLIENT User SERVER APP POST HTTP REQUEST ADD NEW DATA API NEW RESOURCE ADDED SUCCESS RESPONSE 1 2 3 4
  • 5. 5 © 2019 Citrix | Confidential The POST method is often used when uploading a file or when submitting a form over the web. The POST requests that the server accepts new data as a new resource identified by the Request-URI. The URI in a POST request identifies the resource that will handle the data information. POST Method GET⁞POST⁞PUT⁞DEL EXAMPLE 1: USING POST IN SEQUENCE POST /device-management/devices : Create a new device EXAMPLE 2: POST HTTP REQUEST URI POST HTTP http://www.appdomain.com/users/123/accounts
  • 6. 6 © 2019 Citrix | Confidential Lesson Objective Review This method is used to create a new resource into a collection of resources in the System of Record. What is the purpose of the POST method?
  • 7. 7 © 2019 Citrix | Confidential Primary Key
  • 8. 8 © 2019 Citrix | Confidential Primary Key • A primary key is an attribute in a table that contains a unique identifier. • The primary key attribute column is used to uniquely identify each record or row in the table. • The primary key is what delineates each record and avoids changing records for individuals who may possess the same name. • Some of the functions primary keys are used for would be to access a specific record, to avoid duplicating records, to link records to multiple tables, to index data in the table, and to create dependencies just to name a few. Definition Function
  • 9. 9 © 2019 Citrix | Confidential Primary Key • In Postman, Citrix Workspace or any other API development application, the primary key comes into play when making an HTTP call, such as PUT or DELETE, for example. • This key indicates which record a call is made to because the primary key is the record’s unique identifier, just like a fingerprint, it identifies that record. • It doesn’t matter how many people have the same name; they are differentiated by a unique key.
  • 10. 10 © 2019 Citrix | Confidential Lesson Objective Review Each record in the database is identified by a unique identifier (primary key). How is the primary key used?
  • 11. 11 © 2019 Citrix | Confidential PUT Method
  • 12. 12 © 2019 Citrix | Confidential The PUT method requests that the data information that the client is requesting to be updated be stored under the Request-URI. Once the new resource is updated, the origin server returns a successful completion response to the client. PUT Method GET⁞POST⁞PUT⁞DEL EXAMPLE 1: USING PUT IN SEQUENCE PUT /device-management/devices/{id} : Update the device information identified by "id” EXAMPLE 2: REQUEST URIs PUT HTTP http://www.appdomain.com/users/123/accounts/456 CLIENT User API SERVER APP Server Diagram
  • 13. 13 © 2019 Citrix | Confidential Lesson Objective Review The PUT methods is used when an update to a record is made. What is the purpose of the PUT method?
  • 14. 14 © 2019 Citrix | Confidential DELETE Method
  • 15. 15 © 2019 Citrix | Confidential DELETE Method GET⁞POST⁞PUT⁞DEL This is used to eliminate and delete a resource or record completely. The DELETE method requests that the origin server eliminate the resource identified by the Request-URI. EXAMPLE 2: REQUEST URIs DELETE http://www.appdomain.com/users/123 DELETE http://www.appdomain.com/users/123/accounts/456 EXAMPLE 1: USING DELETE IN SEQUENCE DELETE /device-management/devices/{id} : Delete device by "id“
  • 16. 16 © 2019 Citrix | Confidential Lesson Objective Review DELETE method is only used when a record needs to be eliminated from the database or to delete a row in that table. How would the DELETE method be used?
  • 17. 17 © 2019 Citrix | Confidential ​ Module 4
  • 18. 18 © 2019 Citrix | Confidential Lab Exercise • Exercise 4-1: POST – Using Postman to Add Data to SoR • Exercise 4-2: POST – Using Citrix Workspace to Add Data to SoR • Exercise 4-3: PUT – Using Postman to Update Data in SoR • Exercise 4-4: PUT – Using Citrix Workspace to Update Data in SoR • Exercise 4-5: DELTE – Using Postman to Remove Data from SoR • Exercise 4-6: DELETE – Using Citrix Workspace to Remove Data from SoR • Exercise 4-7: Notifications – Creating Notifications for Actions
  • 19. 19 © 2019 Citrix | Confidential Key Takeaways • POST is an HTTP request method used to add new data information to the database, which posts and stores the new information. • The primary key is the unique identifier that identifies a record as a social security number does for people. • In order to update data, use the PUT HTTP request method, which updates the record and stores it. • The DEL method is only used to eliminate a record and must include the primary key in the header.

Editor's Notes

  • #1: CCI Talking Points: Module 4: Citrix Workspace with HTTP Methods| Total Time: <TBD> minutes 20 Slides | Lecture Time: 20 minutes 7 Labs | Lab Time: <TBD> minutes 4-1: POST – Using Postman to Add Data to SoR 4-2: POST – Using Citrix Workspace to Add Data to SoR 4-3: PUT – Using Postman to Update Data in SoR 4-4: PUT – Using Citrix Workspace to Update Data in SoR 4-5: DELETE – Using Postman to Remove Data from SoR 4-6: DELETE – Using Citrix Workspace to Remove Data from SoR 4-7: Notifications – Creating Notifications for Actions The purpose of this module is to: Give the students an understanding of the way HTTP Methods are used using API development applications POSTman and Citrix Workspace.
  • #2: CCI Talking Points: [Point 1] We will the purpose of the POST method by using it in the Postman and Citrix Workspace application using an example. [Point 2] Identify how a primary key is used by looking at the data we configure in Postman and Citrix Workspace. [Point 3] Explain the purpose of the PUT methods through piggy backing off the example used for the POST method. [Point 4] Discuss how to use the DELETE method on the record we will create. Delivery Preparation:  A sign of a great instructor is his or her ability to provide meaningful overviews of the course content as it relates to both the learning trajectory of the course, and also to student experiences. In addition, this is the first chance that students will understand (short of reading the online catalog) what is and is not specifically covered in the course and module.
  • #4: CCI Talking Points: Introduce the POST HTTP Method. Recall from Module 3, slide 30, that POST commands add new data to the database. Present the slides on the screen. Explain the diagram using the Key Notes. Key Notes: This method is used to create a new resource into a collection of resources in the System of Record. The HTTP POST request is used to create a new record in the data source in the RESTful architecture In order to add new data information to the server application, use the POST command in Citrix Workspace. In the database, the API docs contain the header and POST command that is needed to add the new resource to the database. Example: The client makes a HTTP POST request to add new data to the system of record. That HTTP POST request is sent through APIs, to the Server. The server authenticates the HTTP POST request and sends the response. The response is sent through the APIs and formatted in JSON to the client indicating the new data requesting to be added is successfully added.
  • #5: CCI Talking Points: Talk to the bullets first, then explain the examples from the key notes. After reading the first example, recall Mod 3, lesson on Endpoint URIs to bring this point together. Key Notes: There is no data cap on the size to be sent. POST is used to send data to a server to create/update a resource. Example 1: Using POST in sequence example is saying that there is a HTTP POST request to create a new device. After the forward slash, the word devices signifies a new device is to be created. That is because the endpoint URI is describing the data to be added. Example 2: This is an example request URIs for POST HTTP requests. POST always precedes the HTTP syntax. This is saying to POST new data to the Accounts folder, under 123, under Users.
  • #8: CCI Talking Points: Talk through the definition first. Then read through the functions Advise on second bullet that we are not going to go into further detail on these items, they are just to know primary keys have many functions. What this lesson goes through is primary keys in Citrix Workspace instance. Key Notes: The database is responsible for assigning a primary key to a table but is not always necessarily an ID column that is used as the primary key. It is possible to have multiple unique keys that are not primary keys. Each row is a record in the table. And each record is identified by a unique identifier, otherwise known as the primary key. What this means is if the database has two individuals by the same name, but they are not the same person, the unique identifier is what delineates the two individuals. The Primary key’s value is always unique. If the client sends an HTTP request to PUT or update a users last name, using the unique identifier, it will change the record for that specific person instead of both. Primary key is like a fingerprint. A person’s fingerprint is unique to them. Example: An update (PUT command) needs to be made to one of the records in the Systems of Record. That record we want to change looks the same as another record. Because every record in the SoR has its own primary key, this comes into play when making a change to one system of record without affecting the other record that is similar. The primary key is like a person’s fingerprint that says this record is its own record and is the one to be updated.
  • #9: CCI Talking Points: Introduce the primary key. Speak to the bullets on the slide. Transition topic to continue on the HTTP methods – PUT.
  • #12: CCI Talking Points Introduce the PUT method. Source Module 3, slide HTTP methods. Recall put commands are to update and replace information. Explain the diagram using the key notes. Explain the Examples using the key notes. In the first example, recall to the primary key section, slide 8 and 9 of this Module. Key Notes: Use PUT when updating a record completely through a specific resource. This could be updating a user’s email address. Diagram: The diagram illustrates the relationship between the Client, API, and the Server. The Client makes the PUT HTTP request, which is sent through the API, to the Server, then back to the Client with a response. Example 1: This example illustrates the PUT sequence and is referenced with an ID to update the device information to a specific record in the database. Example 2: This example shows how the PUT HTTP method’s syntax. This is what the Request-URI would appear like.
  • #15: CCI Talking Points Introduce the Delete method. Source Module 3, slide HTTP methods: Recall that the delete command eliminates a record from the database completely when the client sends the HTTP delete request. Bring in the Endpoint URI concept when speaking to the Request URI and the example. Key Notes The HTTP DELETE command is straight forward. It is used to delete a resource identified by a URI, such as deleting a user’s name and information. On successful deletion, a response, formatted in JSON, is returned via HTTP response success message. Example 1: This example illustrates the DELETE HTTP request in sequence. This sequence says delete the device for specific ID. What specifying that ID does it make sure the system only deletes that specific piece of data in the record that is identified by that ID. Example 2: This is what the DELETE HTTP method looks like by the Request URI. This is describing the Endpoint URI, the place where the data that is being requested to be deleted, is located.
  • #18: CCI Talking Points: There are 7 lab exercises in Module 4; this slide addresses all 4 of them. This Slide: 4-1 POST – Using Postman to Add Data to SoR Time: <##> minutes 4-2 POST – Using Citrix Workspace to Add Data to SoR Time: <##> minutes 4-3 PUT – Using Postman to Update Data in SoR Time: <##> minutes 4-4 PUT – Using Citrix Workspace to Update Data in SoR Time: <##> minutes 4-5 DELETE – Using Postman to Remove Data from SoR Time: <##> minutes 4-6: DELETE – Using Citrix Workspace to Remove Data from SoR Time: <##> minutes 4-7: Notifications – Creating Notifications for Actions Time: <##> minutes