When you manually map a client to an Identity PSK (IPSK) group using the dashboard, the client will be tied to the group policy (and corresponding VLAN) of that group, regardless of which pre-shared key (PSK) they use to connect.
So, to answer your question, even if a client knows the PSK of a different group, they would still be tied to the group to which they were manually assigned in the dashboard. They would not be able to "hop" to a different VLAN simply by using a different PSK.
The behavior you observed during your testing – where you were able to connect using the PSK from Group B, but still received an IP from the network for Group A – aligns with this.
As for the "set via dashboard" and "set via 802.1x" notations you're seeing, this is indicating how the group policy was applied to the client. "Set via dashboard" indicates that you manually assigned the client to the group via the dashboard, while "set via 802.1x" indicates that the group policy was applied based on the 802.1x authentication process.
In this setup, a manually assigned group policy via the dashboard will take precedence over one assigned through 802.1x authentication. So, even if a client connects using a different PSK, the group policy and VLAN assignment they get will be the one you set manually via the dashboard.
Always remember to save and apply any changes you make in the dashboard, and it may take a few moments for changes to propagate through the system. For testing purposes, you might also need to disconnect and reconnect clients to ensure they're receiving the correct group policy and VLAN assignment.