Creating a Service Principal for the Azure Infrastructure Connector
Creating a Service Principal for the Azure Infrastructure Connector
Use Azure CLI by accessing https://shell.azure.com , select "Bash" console.
Use the command
az ad sp create-for-rbac -n "{sp_name}" --role Reader --scopes /
to create a Service Principal with reader role for Root Scope.
Collect the values for "appId", "password" and "tenant" from the Azure CLI command response for "Client Id", "Client Secret" and "Tenant Id" respectively.
NOTE: To support Write operations, the service principal needs to have 'owner' role.
Workday permissions needed to integrate via the Starling Connector
Workday permissions needed to integrate via the Starling Connector
If the admin account credentials cannot be used in the SCIM integration setup through Starling Connector, the alternative approach is using the credentials of integration system user configured in the Workday tenant. This section describes how to create an integration system user in Workday and to provide the necessary permissions based on the business use-cases.
Creating an integration system user
To create an integration user:
- Sign in to your Workday tenant using an administrator account. In the Workday Application, enter create user in the search box, and then click Create Integration System User.
- Complete the Create Integration System User task by supplying a user name and password for a new Integration System User.
- Leave the Require New Password at Next Sign In option unchecked, because this user will be log on through programmed steps.
- Leave the Session Timeout Minutes with its default value of 0, which will prevent the user's sessions from timing out prematurely.
- Select the option Do Not Allow UI Sessions as it provides an added layer of security that prevents a user with the password of the integration system from logging into Workday.
Creating an integration security group
In this step, you will create an unconstrained or constrained integration system security group in Workday and assign the integration system user created in the previous step to this group.
To create a security group:
-
Enter create security group in the search box, and then click Create Security Group.
-
Complete the Create Security Group task
Configuring domain security policy permissions
In this step, you'll grant "domain security" policy permissions for the worker data to the security group.
To configure domain security policy permissions:
-
Enter Security Group Membership and Access (or Who are the Members of a Security Group) in the search box and click on the report link.
-
Search and select the security group created in the previous step.
-
Click on the ellipsis (...) next to the group name and from the menu, select Security Group > Maintain Domain Permissions for Security Group.
-
Under Integration Permissions, add the following domains to the list Domain Security Policies permitting Put access:
- External Account Provisioning
- Worker Data: Public Worker Reports
- Person Data: Work Contact Information
- Workday Accounts
-
Under Integration Permissions, add the following domains to the list Domain Security Policies permitting Get access:
- Worker Data: Workers
- Worker Data: All Positions
- Worker Data: Current Staffing Information
- Worker Data: Business Title on Worker Profile
- Worker Data: Qualified Workers (Optional - add this to retrieve worker qualification data for provisioning)
- Worker Data: Skills and Experience (Optional - add this to retrieve worker skills data for provisioning)
- Job Information
- Manage: Location
- Manage: Location Hierarchy
- Manage: Organization Integration
- Manage: Supervisory Organization
- Person Data: Date of Birth
- Person Data: Gender
- Person Data: ID Information
-
After completing above steps, the permissions screen will appear summarizing the selected PUT and GET access permissions.
-
Click OK and Done on the next screen to complete the configuration.
Edit business process security policies
To edit the Business Process Security Policies for Functional Area report:
- Access the Business Process Security Policies for Functional Area report.
- Provide the needed “Functional Area” and the “Business Process”, click Edit Permissions in the bottom of the screen.
- Scroll and find the “Initiating Action” which has “(Web Service)” in it.
- Add the Security Group created above.
- Click OK and Done on the next screen to complete the configuration.
- Following are the use-cases where permissions are needed when using with Starling Connect for Workday:
Table 476: Use cases for permissions
Edit Other / Custom IDs for Worker |
Personal Data |
Edit Other IDs |
Change Other IDs (Web Service) |
Modify home contact information |
Contact Information |
Home Contact Change |
Change Home Contact Information (Web Service) |
Modify work contact information |
Contact Information |
Work Contact Change |
Change Work Contact Information (Web Service) |
Modify contact information using maintain contact information API |
Contact Information |
Contact Change |
Maintain Contact Information (Web Service) |
Activating security policy changes
To activate security policy changes:
- Enter activate in the search box, and then click on the link Activate Pending Security Policy Changes.
- Begin the Activate Pending Security Policy Changes task by entering a comment for auditing purposes, and then click OK.
- Complete the task on the next screen by checking the checkbox Confirm, and then click OK.
Configuring integration application in DocuSign
Configuring integration application in DocuSign
Follow the below steps in order to configure an integration application and gather the required information for authentication.
- Log in to the DocuSign eSignature Admin Dashboard. If demo instance is used, the admin dashboard can be accessed at eSignature Admin | DocuSign
- From main menu “Settings”, under side menu “Integrations”, access “Apps and Keys”.
- Under “My Account Information”, collect “User ID”, “API Account ID” and “Account Base URI”.
- Click on “Add App and Integration Key” button to create an integration application, provide the App name.
- Under “Authentication” section
-
Select “Yes” for “User Application”
-
Click “Add Secret Key” under “Authentication Method for your App“ → “Authorization Code Grant“ to add a secret key
-
Under “Service Integration” section
-
Click “Generate RSA” to generate a RSA keypair
-
Copy and save the “Private Key”
-
Under “Additional settings” section
-
Click “Add URI” under “Redirect URIs” to add a redirect URI. For example: http://localhost/
-
“Save” the integration application and collect the “Integration Key” for thus created application under the “Apps and Integration Keys“ list. The integration key acts as the Client Id in the authentication workflow.
-
Complete the admin (integration account) consent flow:
-
Construct an URI in the format https://<authentication_server>/oauth/auth?response_type=code&scope=impersonation%20signature&client_id=<integration_app’s_integration_key>&redirect_uri=<integration_app’s_configured_redirect_uri> and access the URI in the browser by authenticating using the admin credentials. Example value for the consent URL would be https://account-d.docusign.com/oauth/auth?response_type=code&scope=impersonation signature&client_id=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx&redirect_uri=http://localhost/
-
The authentication server would follow the values:
-
account-d.docusign.com for developer environments
-
account.docusign.com for production environments
-
Provide the consent by clicking the “Allow Access" button in the browser page
-
Based on the redirect URI provided, the browser will redirect to the page with access code. This code can be ignored.
Creating integration Connect Client in Coupa
Creating integration Connect Client in Coupa
Follow the below steps in order to configure an integration application and gather the required information for authentication.
-
Login to Coupa as an integrations enabled administrator to create an OAuth2/OIDC Client with a grant type Client Credentials. After configuration, the values of Client ID and Client Secret are used to gain access to the Coupa API.
-
To set up your Coupa test instance with a new connection, go to Setup > Oauth2/OpenID Connect Clients.
NOTE: Type "OAuth" in search box to find the client name quickly.
-
Click Create.
-
For Grant Type select: Client credentials.
-
Specify a name for the Client, Login, Contact info, and Contact Email.
-
Select the scopes from:
-
core.user_group.read
-
core.user_group.write
-
core.user.read
-
core.user.write
-
core.accounting.read
-
core.common.read
-
Click Save.
Saving the client gives you values of the client Identifier and Secret that reqired to gain access to the API scopes you have defined for it.
NOTE: Coupa instance addresses take the form of
https://{organization_name}.coupahost.com (for customer instances) or
https://{organization_name}.coupacloud.com (for partner and demo instances)