Create a Workday Propagation Connection
Number of APIs: 13
This use case shows you how to create a propagation connection between a Workday source identity store and your PingOne directory target identity store.
A Workday propagation connection is unique in requiring a writeback of information from the target, PingOne directory, to the source, Workday. Workday is demonstrated because of its unique writeback requirement. This use case guides you in successfully creating a Workday propagation connection.
This scenario illustrates the following common operations: - Create a propagation plan. - Create a propagation store. - Create a writeback propagation store (applicable only to Workday). - Create a propagation rule. - Create a writeback propagation rule (applicable only to Workday). - Create propagation rule mappings. - Create writeback propagation rule mappings (applicable only to Workday).
Prerequisites
Get an access token from the worker application that you created in Getting Started with the PingOne APIs. To get a token from a different worker application in an alternate sandbox environment, run the token request endpoint using the client ID and client secret of your chosen worker app to authenticate the request. For more information, see GET a Worker Application Access Token.
Workflow order of operations
To create a Workday inbound propagation connection, you will need to complete the following tasks:
1. Make a POST
request to /environments/{{envID}}/passwordPolicies
to create a password policy for the population of users to synchronize with Workday.
2. Make a POST
request to /environments/{{envID}}/populations
to create a population of users to synchronize with Workday.
3. Make a POST
request to /environments/{{envID}}/propagation/plans
to create a Workday propagation plan.
4. Make a POST
request to /environments/{{envID}}/propagation/stores
to create a Workday inbound source propagation store with a type
of Workday
.
5. Make a POST
request to /environments/{{envID}}/propagation/stores
to create a Workday inbound target propagation store with a type
of PingOne
.
6. Make a POST
request to /environments/{{envID}}/propagation/stores
to create a Workday writeback source propagation store of type
directory (applicable only to Workday). No separate writeback target propagation store is required, the target is the Workday inbound source propagation store.
7. Make a POST
request to /environments/{{envID}}/propagation/plans/{{planID}}/rules
to create a Workday propagation rule for mapping Workday
attributes to PingOne
attributes.
8. Make a POST
request to /environments/{{envID}}/propagation/plans/{{planID}}/rules
to create a Workday propagation rule for mapping directory
attributes to Workday
attributes (applicable only to Workday).
9. Make a POST
request to /environments/{{envID}}/propagation/rules/{{ruleID}}/mappings
to create a Workday inbound propagation rule mapping that associates a specific Workday attribute to a specific PingOne attribute.
0. Make a POST
request to /environments/{{envID}}/propagation/plans/{{ruleID}}/rules
to create a Workday writeback propagation rule mapping that associates a specific directory
attribute to a specific Workday
attribute (applicable only to Workday).
1. Make a GET
request to /environments/{{envID}}/propagation/rules/{{ruleID}}/mappings
to verify Workday inbound propagation rule mappings of attributes between Workday
and PingOne
.
2. Make a GET
request to /environments/{{envID}}/propagation/rules/{{ruleID}}/mappings
to verify Workday writeback propagation rule mappings of attributes between directory
and Workday
(applicable only to Workday).
3. Make a GET
request to /environments/{{envID}}/propagation/rules
to verify the Workday inbound propagation rule between Workday
and PingOne
and the Workday writeback propagation rule between directory
and Workday
(applicable only to Workday).
4. Make a GET
request to /environments/{{envID}}/propagation/stores
to verify Workday propagation stores of types Workday
, PingOne
, and directory
.
5. Make a GET
request to /environments/{{envID}}/propagation/plans
to verify Workday propagation plans.
-
Step 12: Read writeback propagation rule mappings to verify GET {{apiPath}}/environments/{{envID}}/propagation/rules/{{wdWritebackRuleID}}/mappings
-
Step 1: Create a password policy for the Workday population POST {{apiPath}}/environments/{{envID}}/passwordPolicies
-
Step 2: Create a population to synchronize with Workday POST {{apiPath}}/environments/{{envID}}/populations
-
Step 3: Create a Workday inbound propagation plan POST {{apiPath}}/environments/{{envID}}/propagation/plans
-
Step 8: Create a Workday writeback propagation rule POST {{apiPath}}/environments/{{envID}}/propagation/plans/{{wdPlanID}}/rules
-
Step 9: Create a Workday inbound propagation rule mapping POST {{apiPath}}/environments/{{envID}}/propagation/rules/{{wdInboundRuleID}}/mappings
-
Step 10: Create a Workday writeback propagation rule mapping POST {{apiPath}}/environments/{{envID}}/propagation/rules/{{wdWritebackRuleID}}/mappings
-
Step 11: Read inbound propagation rule mappings to verify GET {{apiPath}}/environments/{{envID}}/propagation/rules/{{wdInboundRuleID}}/mappings
-
Step 13: Read all propagation rules to verify GET {{apiPath}}/environments/{{envID}}/propagation/rules
-
Step 14: Read all propagation stores to verify GET {{apiPath}}/environments/{{envID}}/propagation/stores