Creating integration Connect Client in Coupa
Creating integration Connect Client in Coupa
Follow the below steps in order to configure an integration application and gather the required information for authentication.
-
Login to Coupa as an integrations enabled administrator to create an OAuth2/OIDC Client with a grant type Client Credentials. After configuration, the values of Client ID and Client Secret are used to gain access to the Coupa API.
-
To set up your Coupa test instance with a new connection, go to Setup > Oauth2/OpenID Connect Clients.
NOTE: Type "OAuth" in search box to find the client name quickly.
-
Click Create.
-
For Grant Type select: Client credentials.
-
Specify a name for the Client, Login, Contact info, and Contact Email.
-
Select the scopes from:
-
core.user_group.read
-
core.user_group.write
-
core.user.read
-
core.user.write
-
core.accounting.read
-
core.common.read
-
Click Save.
Saving the client gives you values of the client Identifier and Secret that reqired to gain access to the API scopes you have defined for it.
NOTE: Coupa instance addresses take the form of
https://{organization_name}.coupahost.com (for customer instances) or
https://{organization_name}.coupacloud.com (for partner and demo instances)
Retrieving Azure DevOps Personal Access Token (PAT)
Retrieving Azure DevOps Personal Access Token (PAT)
Follow the below steps to generate/retrieve a PAT.
-
Login to the Azure DevOps portal of your orgainization.
-
From your home page, open user settings and select Personal access tokens.
-
Select + New Token.
-
Name your token, select the organization where you want to use the token, and then set your token to automatically expire after a set number of days.
-
Select scopes as full access and click on create.
-
Copy the token and store it in a secure location. For your security, it doesn't display again.
Setup integration system and field override service in Workday
Setup integration system and field override service in Workday
Field Overrides are an alternate way to pull custom attribute information from Workday that replaces the existing custom report facility.
Configuration
To use Field Overrides, Workday administrators must create a new Field Override Integration System within Workday, add the desired custom attributes to it, and configure Okta to use this Integration System when fetching worker data.
To create a Field Override Integration
-
Log in to your Workday account as an administrator, search for Integration System in the search bar, and then click Create Integration System.
- Enter the following:
-
System Name: Enter a name for your System Integration.
-
Comment: Optionally add a comment.
-
Template: Select worker from the New using template drop-down menu.
- Press Enter.
- From the list of results, select Core Connector: Worker, then click OK:
- You're redirected to a page for your freshly created Integration System.
- Scroll down to the Custom Integration Services section and click the + (plus) sign.
- Click Create.
- Select Create Integration Field Override Service from the list of services.
- Enter a Name for the Field Override Service, and select Worker as the Business Object.
- Add more fields to your Field Override Service by clicking the + (plus) sign. Property types are based on the property name, so if you want to have properties of different types, refer to Field Override Property Types for more information about the property types and naming conventions. Click OK.
- Now you need to configure the field mappings after creating Integration Service. Go to Actions > Integration System > Configure Integration Field Overrides.
- Select your Integration Service from the list on the left and configure the mappings for your fields. Type and search for a desired field. Make sure that property types are matching.
- After you have mapped all the properties, click OK>Done.
- Search for your Integration System in Workday, then go to Actions > Integration IDs > View IDs.
- Copy and save the value of Integration_System_ID. You need this value to set up and update your provisioning settings.
Retrieving Atlassian Cloud API Key and Directory ID
Retrieving Atlassian Cloud API Key and Directory ID
To generate API key and Directory ID:
-
Go to admin.atlassian.com and select your organization.
-
From the top menu, navigate to Security, and then click on Identity providers from the left-hand panel.
-
Choose the relevant Identity Provider.
-
Add the directory name and set up user provisioning.
-
Click on the Set up user provisioning and then click next.
-
Save SCIM base URL (https://api.atlassian.com/{directoryId}) and API key and click on save and continue.
-
Copy the value of base URL, directory Id and the API key and keep them in a safe place. We won’t show them to you again.
-
Click on Stop and save SCIM configuration.
-
Use this SCIM base URL and API key to connect to the identity provider and sync the users and groups from identity provider to Atlassian.