This page describes how to connect Workday to Agentspace Enterprise.
After you set up your data source and import data the first time, the data store syncs data from that source at a frequency that you select during setup.
Before you begin
Before you create a Workday connector, make sure you have the following:
- Client ID
- Client secret key
- Refresh token
These credentials are necessary for connection authentication.
Use the following steps to generate a client ID, secret key, and refresh token, create a new user in the Workday instance, assign them to a security group, and grant the necessary permissions.
Set up Workday and register API client in Workday
To register an API client in Workday, do the following:
Sign in to your Workday instance. For example, https://YOUR_INSTANCE_ID.workday.com/wday/authgwy/YOUR_TENANT/login.html
In the search bar, search for
Register API client
.Click Register API client for integrations.
In the Register API client form:
- Enter Client name.
- Set Client type to Authorization code grant.
- Set Access token type to Bearer.
- Provide Redirection URL.
- Set Refresh token timeout (in days).
- Add necessary Scopes (Functional area).
- Click Ok.
Register API client form
Workday generates the following details:
- Client ID
- Workday REST API endpoint
- Token endpoint
- Authorization endpoint
Set permissions and roles for Workday user
To set up an integration system user, create a security group, add the user to the group, and assign required permissions, do the following:
Create integration system user:
- Search for
Create system integration group task
. In the form:
- Enter Username.
- Set Password.
- Set Session timeout to
0
. - Check Do not allow UI sessions.
- Click Ok.
Create integration system user form The created user details are displayed.
Created user details - Search for
Create integration security group:
- Search for
Create security group
. - In the dialog window:
- Select Type as Integration system security group (Constrained).
- Enter a Name.
- Click Ok
Create security group form In the Edit integration system security group (Constrained) window:
- Add the Integration system user to the group under Integration system users.
- Add relevant Organizations.
- Click Ok.
- Click Done.
Edit integration system security group Integration system user security configuration - Search for
Grant domain access:
- Search for
Maintain permission for security group
. In the dialog window:
- Set Operation as Maintain.
- Add the created Security group.
Click the three dots (...) beside the group name and select Edit.
Edit the security group
In the Maintain permission for security group page:
- Click the icon under Domain security policy permissions.
- Add the following permissions for
View/modify access and domain security policy:
Worker
Worker data: Public worker reports
Worker data: Job details
Worker data: Organization information
Worker data: Worker ID
Customer
View: Customer
Jobs
Worker data: All positions
Click Ok.
Maintain permissions for security group Click Done.
View security group Repeat the search for Maintain permission for security group, verify that the roles and policies are added, and click Ok.
Maintain permissions for security group form
- Search for
Activate pending security policy changes:
- Search for
Activate pending security policy changes
. In the Activate pending policy changes page:
- Add Comments.
Click Ok.
Activate pending changes
Review the changes on the Activate pending security policy changes page
Click Confirm.
Click Ok.
Activate policy changes
The View security timestamp page is displayed.
Security timestamp - Search for
Generate refresh token:
- Search for Register API client for integration.
In the form:
- Enter Client name.
- Select Non-expiring Refresh token.
- Add Scopes:
Personal data
andIntegration
. Click Done.
Register API client for integration
Search for
View API clients
.Navigate to API clients for integrations.
Locate the created user.
Click the three dots (...) next to the user and select API client >> Manage refresh token for integration.
Manage refresh token for integration In the dialog window:
- Select the Workday account user
Click Ok
Select the Workday account user
On the Delete or regenerate refresh token page:
- Select Generate new refresh token.
- Click Ok.
Select generate new refresh token
You can see the Successfully regenerated refresh token confirmation message with details.
Create a Workday connector
Console
To use the Google Cloud console to sync data from Workday to Agentspace Enterprise , follow these steps:
In the Google Cloud console, go to the Agentspace page.
In the navigation menu, click Data stores.
Click
Create data store.On the Select a data source page, scroll or search for Workday to connect your third-party source.
Select data source Enter the required authentication details:
- Client ID
- Client secret
- Refresh token
Click Continue.
Enter authentication details Under Destinations, in the URL field, enter Host 1.
Click Continue.
Enter URLs Under Advanced options, enter the tenant ID and click Continue.
Enter Workday tenant Select which entities to sync.
Select a synchronization frequency and click Continue.
Sync frequency Select a region for your datastore.
Enter a name for your data connector.
Click Create. Agentspace Enterprise creates your datastore and displays your data stores on the Data stores page.
To check the status of your ingestion, go to the Data stores page and click your connector name to see details about it on its Data page. The Connector state changes from Creating to Running when it starts synchronizing data. When ingestion is complete, the state changes to Active to indicate that the connection to your data source is set up and awaiting the next scheduled synchronization.
Depending on the size of your data, ingestion can take several minutes or several hours.
Next steps
To attach your data store to an app, create an app and select your data store following the steps in Create an app.
To preview how your search results appear after your app and data store are set up, see Preview search results. If you used third-party access control, see Preview results for apps with third-party access control.
To enable alerts for the data store, see Configure alerts for third-party data stores.