Getting Started

Welcome to the Attendance on Demand Web Services Developer Resource Site. Here you will find information about:

  • How to get started and authenticate with Attendance on Demand’s APIs
  • Solutions to integrate employee, payroll, and user account data
  • Our web service methods available with example code

You should be familiar with the concepts of WSDL defined contracts, SOAP remote procedure calls, remote objects, and applying basic authentication to HTTPS requests within your preferred development environment.

To get started with our web services, check out the resources below. Learn how to integrate with Attendance on Demand, access all the APIs, and exchange data.

Setting Up TLS Ciphers

To maintain the high standards of data sharing, all communication must be done using TLS. Your application must be able to validate Attendance On Demand’s TLS Certificate.

Attendance on Demand enforces TLS v1.3 for all API communications using one of the three ciphers below:

  • TLS_AES_256_GCM_SHA384 (0x1302) ECDH secp256r1 (eq. 3072 bits RSA) FS
  • TLS_CHACHA20_POLY1305_SHA256 (0x1303) ECDH secp256r1 (eq. 3072 bits RSA) FS
  • TLS_AES_128_GCM_SHA256 (0x1301) ECDH secp256r1 (eq. 3072 bits RSA) FS

Attendance on Demand enforces TLS v1.2 for all API communications using one of the four ciphers below:

  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) ECDH secp256r1 (eq. 3072 bits RSA) FS
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) ECDH secp256r1 (eq. 3072 bits RSA) FS
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e) DH 2048 bits FS
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f) DH 2048 bits FS

Extract the WSDL Definition

Extracting the WSDL definition is easy as acting upon the definition from the site:

https://[yourURI].attendanceondemand.com:8192/cc1.aew/wsdl/IAeXMLBridge

The WSDL is held under an SSL but does not require authentication to extract.

For most development environments, once your development tool reads the WSDL definition (contract) from the above URL you will be able to immediately begin invoking the defined methods.