BizLibrary

Engagedly has partnered with BizLibrary to offer industry-leading online training courses to elevate employees’ skills and create better places to work.

The BizLibrary Collection is an award-winning, aggregated, online training library containing thousands of micro-videos on a wide variety of topics focused on employee development and skills.

The course library provided within Engagedly LMS includes a variety of interactive training on subjects ranging from HR Compliance, Workplace Safety, Business Skills, Software, Leadership & Management, Information Technology, and Sales & Service.

Is your training program everything it could be?

How satisfied are you with your current training efforts? Maybe you’re focused on compliance, or you’re trying to get new managers up to speed, or maybe training is one of those things that haunts your never-ending to-do list each week (I get it). Wherever you are on your training journey, we can help.

What makes BizLibrary courses effective?

A large selection of courses

The BizLibrary contains thousands of video lessons and courses, with an average of 100+ new titles added monthly and a 90-day retirement period for content to keep the content fresh and relevant.

Learning Reinforcement

A wide variety of support materials such as quizzes , transcripts, and other support materials are available for each lesson to reinforce learning, extend learning retention, and increase ROI.

Courses Tailored For All

From short, micro-video lessons, to more in-depth video courses, interactive video programs, eBooks, and eLearning courses, BizLibrary offers content that meets the needs of all types of learners.

Mobile-Friendly

BizLibrary’s mobile-responsive design allows users to access the content from any device and from anywhere around the world at their free will.

Join the hundreds of organizations already seeing better employee engagement with Engagedly

“​​From the process standpoint, we have revolutionized the efficiency of reviews. A process that once took four months now takes four weeks. And best of all, measuring employee growth isn’t limited to annual reviews.”

Mark Nemeth
head of performance optimization

Schedule a Demo

Schedule a live demo and have your questions answered by one of our Talent Management Consultants


Gusto

Synchronization specifications

Following are the default fields that can be synced from Gusto to Engagedly:

  • Employee first name
  • Employee last name
  • Job title
  • Work email address
  • Manager
  • Employee status (Active, Blocked)

Note

  • Above is the default field mappings that are configured while establishing sync for the first time. Mappings can be customized according to your requirements.
  • For the initial sync, only permanent employees are synced from Gusto to Enagegdly.
  • Contractual employees are not synced during the initial synchronization process.

Follow the steps below to integrate with Gusto

After the admin of your organization has enabled Gusto, you will be able to access it in the Engagedly tool.

Step 1: Setting up the connection

  • Login to the Engagedly application
  • Go to Settings –> Integrations
  • On the integrations tab, you will see Gusto as one of the options to connect
  • Click on connect
  • You will get a pop-up where you have to login with your Gusto credentials or any of the SSO options
  • Once you have provided your credentials, you need to authorize the integration process
  • Once you have provided the authorization, Gusto will be connected to the Engagedly application and will be ready for the integrations process
  • Companies selected in the Engagedly’s integration page would be included in the sync process, unselected companies would be excluded from the sync.
  • If you want to disable the sync between Gusto and Engagedly, you have to click on the disconnect button.
  • You can re-authorize the connection by following the same steps as above.

Types of synchronization

1. Manual Synchronization

You can synchronize users manually from Gusto to Engagedly by following these steps:

  • Login to the Engagedly application
  • Go to Settings –> Integrations –> Gusto
  • Click on the ‘SYNC USERS’ button.

Click on the ‘SYNC USERS’ button.

2. Automatic Synchronization

In case of automatic synchronization:

  • After the successful authroization of a Gusto account, users would be synchronized once in 24 hours based on the default time configuration.
  • By default, the sync time configuration is 6:30 AM UTC. Contact the support team if you want to change the sync time.

After every successful synchronization, the user who has initiated the process will receive an email notification.

Email notifications

After every successful synchronization (both for creating and updating), a status report will be sent via email to the user who have initiated the synchronization.

Step 2: Adding an employee in Gusto

Updating user demographics can only be done through the Engagedly application at the moment. Follow the instructions here to update user demographics for individuals or a number of users at one go.

Step 3: Field mappings

These are the field mappings in the current system. However, the field mappings can be implemented based on client requirements later.

Along with the field mappings, the client has to provide the settings like whether they want to

  • Sync only the active Employees
  • Sync all the Employees (active, dismissed)
  • Sync all the Department, Managers, Job titles, and locations details
Note
  • Dismissal of employees in Gusto is considered as BLOCKED Employees under Engagedly.
  • Fields like Level, Gender, Secondary Phone Number, Business Unit, HR Managers, Secondary Managers, Ethnicity are not mapped in Engagedly.
No. Gusto fields Engagedly fields
1. First name First Name
2. Last name Last Name
3. Work Email Email
4. Manager Reporting to
5. Job Title Job Title
6. Terminated Status

Step 4: Synchronizing employee accounts

Based on these details from the client, the engineering team will integrate the process of syncing all the Employee accounts from Gusto to Engagedly. A CRON job will be implemented on a daily basis. So that, the Employee accounts in Gusto will be up to date in the Engagedly application.

  • Adding a new employee
  • Updating the existing employee details
  • Blocking or dismissing the employees
  • Editing the Department, Job Titles and other employee information present in your field mapping will be synced on the next scheduled CRON job.

Engagedly user list

Gunto user list

Step 5: Troubleshooting syncing issues

If an admin changes or token is invalid, then in that case, the user can follow the below steps to re-connect between Engagedly and Gusto.

  • Sign in to Engagedly
  • Go to settings –> Click on Integrations
  • Find GUSTO in the listing
  • If it’s already connected, User has to DISCONNECT and Re-Connect again
  • Click on CONNECT button
  • In the Pop-up window Enter valid Username and Password –> Select desired GUSTO company and
  • Click on AUTHORIZE

Disconnect the integration process between Engagedly and Gusto

If the user wants to stop the syncing process between Engagedly & Gusto, the user can follow the below steps.

  • Sign in to Engagedly
  • Go to settings –> Click on Integrations
  • Find GUSTO in the listing
  • Click on the DISCONNECT button

How to merge users between Engagedly and Gusto for the below scenario:

1. An employee exists on Engagedly with the following information:

  • FirstName: Jon
  • LastName: Smith
  • Email: Jon@gusto.com

2. The employee is then created on Gusto by the following information:

  • FirstName: Jonathan
  • LastName: Smith
  • Email: John.Smith@gusto.com

In the above scenario, there would be neither a name nor email match found.

Solution:

At the time of creating an organization, we can select either Employee ID or EMAIL ID as the Unique identifier to identify the users for the sync process.

  • For the above scenario, we can select the Unique identifier as Employee ID. Before initiating the sync process, you need to get the Employee ID for that particular user and Map it manually in Engagedly.
  • Employee ID can be copied from URL, as shown in the below attachment
  • Copied Employee ID has to be added in Engagedly Employee ID field
  • Now you can initiate the Sync process, and employee details will be updated.

Slack

Engagedly’s Slack Integration lets you receive notifications in your Slack channel.

To connect your Engagedly account with your Slack workspace, perform the following steps:

Step 1:

Go to your Engagedly platform.

Step 2:

From the left navigation, go to ↓ and select Slack Integration.

Step 3:

Click Add to Slack.

Step 4:

Sign in to your workspace.

Step 5:

Click Allow to grant the service access to Slack.

Another way to enable the integration is via your Slack workspace.

Step 1:

Click Apps, located at the left sidebar (Click More, if you don’t see this option).

Step 2:

Search for Engagedly and click Add. You will be directed to Slack App Directory.

Step 3:

Click Add to Slack.

Step 4:

Click Allow to grant the service access to Slack.


SAML SSO and ADFS

Follow the steps below to integrate with SAML SSO with ADFS

Step: 1

Log into Engagedly as a Site Administrator. Go to Integrations in Settings and click on SAML SSO.

Now click on ‘+Add’ and fill in your organization name. Once you’re done filling in, click ‘Save.

Now select the edit icon on the page that appears next.

The page is divided into two parts:

Now select the edit icon on the page that appears next.

  1. Information that you need to copy from here (Engagedly) and input in the Identity Provider(AD FS)
  2. Information that you need to copy from the Identity Provider and input into Engagedly

Step: 2

After you have successfully configured Active Directory Federation Services (ADFS) you are ready to set-up a connection with Engagedly. The following steps will help you set up AD FS.

Adding a Relying Party Trust

Open ADFS Management then select Relying Party Trust Folder, after that, from the action side bar on the right side, click add ‘Relying Party Trust’.

This opens a new wizard and a welcome screen, there click on Start to begin.

Here, you have to follow a series of steps (As listed on the left-hand side of the page) to complete the process.

  1. Select the last option Enter Data About the Party Manually from the Select Data Source screen and click next.
  2. On the Specify Display Name screen enter a recognizable display name and if you wish, add some notes also (optional). Click Next.

3. On the Choose Profile Screen select ADFS profile and click ‘Next’.

4. On the Configure Certificate screen leave the default values as they are and click next.

5. On the Configure URL screen, check Enable Support for the SAML 2.0 WebSSO protocol checkbox. In the service URL text box, copy and paste the ACS URL from the Engagedly SAML SSO page shown in STEP 1. Click next

6. On this screen you have to add a Relying Party Identifier. To do that, copy the Entity ID from the Engagedly SAML SSO page and paste it. Click next.

If you wish, you can configure multi-factor authentication on this screen. However, as it not related to this documentation we are skipping it and going forward to the next step.

7. On the Choose Issuance Authorization Rules screen, select the Permit all users to access this relying party radio button and click next.

The following steps will display an overview of the settings. Click close to exit and open the Claim Rule Editor.

Setting up Claim Rules

You have successfully created a Relying Part, now you need to create Claim Rules. The Claim Rule editor will pop up automatically once you close the editor for creating Relying Party.

Click ‘Add Rule’

Select Send LDAP Attributes as Claims from the dropdown menu. Click next.

On this screen, select Active Directory as attribute store, give any name to the rule, for example, you can name it Get Email Attributes. Select LDAP Attribute to E-Mail-Addresses, and the Outgoing Claim Type to E-mail Address. Click Finish.

Now we have to create another rule, for that:

  • Click Add Rule.
  • Select Transform an Incoming Claim as the claim rule template to use. Click next.
  • Set any name like Email to Name Id. Set the Incoming claim type as E-mail Address (it must match the Outgoing Claim Type in the rule 1 set in step 2.2.3). The Outgoing claim type is Name ID and the Outgoing name ID format is Email. Check Pass through all claim values and click Finish.

To verify the claim rules edit the existing rules and click View Rule Language.

Rules should match below:

c:[Type == “http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname”, Issuer == “AD AUTHORITY”]

=> issue(store = “Active Directory”,

types = (“http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress”),

query = “;mail;{0}”, param = c.Value);

c:[Type == “http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress”]

=> issue(Type = “http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier”,

Issuer = c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = c.Value, ValueType = c.ValueType,

Properties[“http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format”]

= “urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress”);

Setting the Trust Setting

You still need to configure few settings for the Relying Party Trust. To do so, open AD FS Management then select Relying Party Trust Folder. Right click on the newly created Relying Party Trust and click Properties.

Select the ‘Advanced’ tab and select SHA-1 in the drop down.

Select Monitoring tab and copy paste the ACS URL from Engagedly SAML SSO page into the text box labeled Relying Party’s federation metadata URL and then click test URL. If everything is fine, close the wizard

Setting up Engagedly

To set up Engagedly, you have to get two URL’s called Identity Provider Issuer and Identity Provider Single Sign-On URL and a Identity Provider X.509 Certificate from your AD FS.

To get the Identity Provider Issuer URL you have to download the metadata xml file from the metadata URL of AD FS. You can get the metadata URL from AD FS Management by following these steps – Service|Endpoints > Metadata > Type:Federation Metadata.

The url should be something like this https:///federationmetadata/2007-06/federationmetadata.xml. Once you have downloaded the file open it and look for entityId and copy the URL and paste it in beside Identity Provider Issuer in Engagedly SAML SSO page.

To set the Identity Provider Single Sign-On URL look for SingleSignOn Location in the AD FS metadata xml file and copy paste it beside Identity Provider Single Sign-On URL in the Engagedly page. Do not forget the slash at the end of the URL.

Now you have to get the Certificate from AD FS. To do that, open AD FS Management > Go to folder Certificate > right click on Token Signing > View Certificate > Go to tab Details > Then Copy to File.

In the wizard select Base-64 encoded X.509 and download the file. Open the file in a text editor like Notepad, copy the certificate and paste it beside Identity Provider X.509 Certificate in the Engagedly SAML SSO page.

STEP 4

At the Engagedly SAML SSO page click SAVE to save the setting.

Congratulations, you have successfully integrated your Engagedly account with ADFS!


Traliant

The course library provided within Engagedly LMS includes a variety of interactive training on subjects from Sexual Harassment Prevention, Diversity and Inclusion, Information Security to Code of Conduct, which instruct learners on how to handle difficult, real-world situations and reward them with points for correct answers in challenges along the way.

Interactive Training You Experience

A Hollywood style video production provides high-quality interactive videos with real world situations and different endings. Your people are engaged throughout the course; not just “clicking next”.

Global Language Support

Courses are now supported in more than several languages with timed voice over dubbing matched with the speaker, their intent, and actions, so it’s not distracting for learners. All onscreen text and closed-captioning is also translated to the localized language.

Immersive Training for the Digital Workforce

Courses are created in a news show format with video episodes that increase learning and retention by portraying realistic workplace scenarios. The short episodes are easy to absorb and are a perfect fit for busy teams with hectic schedules to work around—they are built for the way people learn!

Personalized and Effective Course Progress

Compliance training that gives employees an unlimited number of chances to complete the assessment encourages random clicking and people quickly figure out the correct responses Our course format is designed to reward correct answers with shortened courses. Right answers move employees along to the next topic while wrong answers are provided with “teachable moments” and additional testing.

Industry Specific Course Library

Not all industries are created equal. So Engagedly partnered with Traliant to develop industry-specific course libraries at one low price. Here are the different course libraries:

  • Preventing Discrimination & Harassment for Office
  • Interview Compliance & Fair Hiring
  • Active Shooter Response
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • Export Controls
  • Fair Labor Standards Act

Including Bite-Sized Traliant Sparks

  • Bystander Intervention – We’re in this Together
  • Protection from Retaliation – Doing the Right Thing
  • Unconscious Bias – Superstar Search (MGR)
  • Political Discussions at Work – Civics & Civility
  • Preventing Discrimination & Harassment for Hotels
  • Recognizing & Preventing Human Trafficking for Hotels
  • Interview Compliance & Fair Hiring
  • Active Shooter Response
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • Fair Labor Standards Act

Including Bite-Sized Traliant Sparks

  • Social Media Behavior – Bad Influencer
  • Personal Liability – Crossing Lines
  • Civility in the Workplace – It’s Elementary
  • Political Discussions at Work – Civics & Civility
  • Preventing Discrimination & Harassment for Restaurants
  • Interview Compliance & Fair Hiring
  • Active Shooter Response
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • Fair Labor Standards Act

Including Bite-Sized Traliant Sparks

  • Unwanted Touching – The Lunch Rush
  • Social Media Behavior – Bad Influencer
  • Pregnancy Discrimination – Misguided Decision (MGR)
  • Political Discussions at Work – Civics & Civility
  • Preventing Discrimination & Harassment for Health care
  • Interview Compliance & Fair Hiring
  • Active Shooter Response
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • HIPAA for Covered Entities
  • HIPAA for Business Associates
  • Fair Labor Standards Act

Including Bite-Sized Traliant Sparks

  • Bystander Intervention – We’re in this Together
  • Protection from Retaliation – Doing the Right Thing
  • Civility in the Workplace – It’s Elementary
  • Political Discussions at Work – Civics & Civility
  • Preventing Discrimination & Harassment in Industrial/Manufacturing
  • Interview Compliance & Fair Hiring
  • Active Shooter Response
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • Export Controls
  • Fair Labor Standards Act

Including Bite-Sized Traliant Sparks

  • Inappropriate Jokes – Off Limits
  • Respectful Communications – Breathe
  • Inclusion – The Table
  • Political Discussions at Work – Civics & Civility
  • Preventing Discrimination & Harassment in Construction
  • Interview Compliance & Fair Hiring
  • Active Shooter Response
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • Export Controls
  • Fair Labor Standards Act

Including Bite-Sized Traliant Sparks

  • Inappropriate Jokes – Off Limits
  • Respectful Communications – Breathe
  • Facilitation Payments – What’s the Hold Up? (MGR)
  • Political Discussions at Work – Civics & Civility
  • Preventing Discrimination & Harassment for Retail
  • Interview Compliance & Fair Hiring
  • Active Shooter Response
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • Export Controls
  • Fair Labor Standards Act

Including Bite-Sized Traliant Sparks

  • Bystander Intervention – We’re in this Together
  • Socializing with Coworkers
  • Protecting Customer Information – No Compromises
  • Political Discussions at Work – Civics & Civility
  • Title IX: Preventing Sexual Misconduct for Students
  • Title IX: Preventing Sexual Misconduct for Faculty & Staff
  • Title IX: Preventing Sexual Misconduct for Faculty & Staff – “Responsible Employee”
  • Preventing Discrimination & Harassment for Office
  • Clery Act
  • Family Educational Rights & Privacy Act (FERPA)
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • HIPAA for Business Associates
  • Drug & Alcohol Awareness on Campus – Coming Soon

Including Bite-Sized Traliant Sparks

  • Bystander Intervention – We’re in this Together
  • Personal Liability – Crossing Lines
  • Civility in the Workplace – It’s Elementary
  • Political Discussions at Work – Civics & Civility
  • Code of Conduct: Enterprise Edition
  • Code of Conduct: Essentials
  • Anti-Bribery & Anti-Corruption
  • Active Shooter Response
  • Data Privacy, GDPR & Information Security
  • Bloodborne Pathogens
  • Export Controls
  • HIPAA for Covered Entities
  • HIPAA for Business Associates
  • Avoiding Insider Trading
  • FAR Code of Conduct
  • Healthcare Code of Conduct
  • Bystander Intervention
  • Workplace Diversity, Inclusion & Sensitivity
  • Avoiding Retaliation
  • Unconscious Bias
  • Interview Compliance & Fair Hiring
  • HR Compliance Essentials for Managers
  • Fair Labor Standards Act

PREVENTING DISCRIMINATION & HARASSMENT

The course is divided into brief, bite-sized episodes covering;
Sexual Harassment, Discrimination, Bystander Intervention, and Diversity and Inclusion.

Traliant’s Preventing Discrimination & Harassment training complies with all Federal & State regulations, including California, Connecticut, Delaware, Illinois, Maine, and New York State and City. It is available in a separate version for Employees and Managers, who have additional responsibilities to prevent and report workplace misconduct.

Managers

  • Managers(55 Min)
  • California (120 Min)
  • Connecticut (120 Min)
  • Delaware (55 Min)
  • Illinois (60 Min)
  • Maine (55 Min)
  • New York (60 Min)

Employees

  • Employees (40 Min)
  • California (60 Min)
  • Connecticut (120 Min)
  • Delaware (45 Min)
  • Illinois (50 Min)
  • Maine (45 Min)
  • New York (50 Min)

Selective Course Overviews

Diversity inclusion training suite

Download

Microaggressions in the workplace

Download

Discrimination and harassment | UK

Download

Unconscious bias

Download

Workplace diversity, inclusion and sensitivity

Download

Discrimination and harassment | Canada

Download

Preventing discrimination

Download

Join the hundreds of organizations already seeing better employee engagement with Engagedly

“​​From the process standpoint, we have revolutionized the efficiency of reviews. A process that once took four months now takes four weeks. And best of all, measuring employee growth isn’t limited to annual reviews.”

Mark Nemeth
head of performance optimization

Schedule a Demo

Schedule a live demo and have your questions answered by one of our Talent Management Consultants


Paylocity

Follow the steps below to have a seamless data sync between Paylocity and Engagedly.

Step: 1

You have to complete the PADE form and return it to your dedicated Paylocity account manager.

Step: 2

You have to complete the PADE form and return it to your dedicated Paylocity account manager.

Once the PADE form is submitted and verified successfully, email us your CompanyID of Paylocity to support@engagedly.com.

Step: 3

Our team will verify the integration with Paylocity.

Step: 4

Once the verification is done, the daily sync setup will be made available from Engagedly’s engineering team.

List of field syncs from Paylocity to Engagedly:
No Fields Data Type
1. firstName string
2. middleName string
3. lastName string
4. phoneNumber number
5. secondaryPhoneNumber number
6. joiningDate date
7. employeeId string
8. email string
9. birthdate date
10. gender string
11. jobTitle string
12. Location string
13. ReportsTo string
14. Departments string
15. BusinessUnits string

Okta

Follow the steps below to integrate with Okta

Step: 1

Log in to Engagedly as a Site Administrator.

Go to Settings and click on SAML SSO.

Now click on ‘+Add’ and fill in your organization name. Once you’re done filling in, click ‘Save’.

Now select the edit icon on the page that appears next.

This page is divided into two sections:

  1. Information that you need to enter copy from here and input IN the Identity Provider
  2. Information that you need to copy from the Identity Provider and input into Engagedly

Step 2:

Now log in to Okta as an Admin. Click on Admin button at the top right corner.

Step: 3

Then go to Application and click on ‘Add Application’ button.

Step: 4

Now click on ‘Create New App’ button present on the top right section of the page.

A pop-up will appear with two options. Select SAML 2.0 and click on ‘Create’ button.

Step: 5

You will be redirected to ‘General settings’.

Input the “Application Name” as Engagedly and logo (optional).

If you choose to add the Engagedly logo please use the Engagedly logo from here: https://engagedly.com/wp-content/uploads/2015/03/Logo-Engagedly13.png).

Click on Next.

Step: 6

In the General Setting form you have to copy two links from Engagedly(Engagedly > SAML SSO) and paste it here.

  • Copy the settings called ‘ACS URL’ from Engagedly > SAML SSO page and paste this link beside the label ‘Single sign on URL’. Check the option ‘Use this for Recipient URL and Destination URL’.
  • Copy the link called ‘Entity ID’ from Engagedly > SAML SSO page and paste this link beside the label ‘Audience URI (SP Entity ID)’
  • Keep the ‘Default RelayState’ and ‘Name ID format’ empty.
  • For ‘Application username’ Select option Email.
  • Click on Next

Step 7:

In the next form for the 1st field ‘Are you a customer or partner?’ you will find two options. Select the first radio button ‘I’m an Okta customer adding an internal app’.

Enable ‘Contact app vendor’ field. Now click on Finish button

Step: 8

On clicking the button a page will appear on a new tab with the links that needs to be saved in Engagedly. Copy these links and paste it in Engagedly.

  • Copy setting ‘Identity Provider Single Sign-On URL’ from Okta page then got to Engagedly > SAML SSO and paste in beside ‘Identity Provider Single Sign-On URL’.
  • Copy setting ‘Identity Provider Issuer’ from Okta page then got to Engagedly > SAML SSO and paste in beside ‘Identity Provider Issuer’.
  • Copy setting ‘X.509 Certificate’ from Okta page then got to Engagedly > SAML SSO and paste in beside ‘Identity Provider X.509 Certificate’.
  • ‘Enable SAML’ on the SAML SSO page in Engagedly by clicking on the check-box> Click on Save button.

You have now finished SAML SSO integration of Engagedly with Okta. Now when users try to login from your custom Engagedly sub domain ( yourorganization.engagedly.com) they will get redirected to the standard Okta Login page.


BambooHR

Follow the steps below to integrate with BambooHR

Step: 1

Request Engagedly’s support team to integrate Engagedly with BambooHR

Step: 2

Login to Engagedly application with your user credentials

Step: 3

Go to settings >> Click on Integrations >> BambooHR

Step: 4

Add the BambooHR subdomain that you want to integrate with Engagedly and save it.

Step: 5

Once you add the sub-domain, you will be asked to login to your BambooHR account, if you’re not already logged in.

Step: 6

Once the integration between BambooHR and Engagedly is successful, you will be able to see the BambooHR URL and API key as shown below.

Step: 7

After this you can login to the Bamboohr application and perform any actions like adding a new employee, updating employee details or terminating an employee.

Step: 8

Field mapping details

  • The connector app uses the access key obtained using openID connect and appends this in header of the APIs that are called for getting data from bambooHR.
  • The scheduler runs twice a day (12:00 am and 12:00 pm UTC).
  • The below fields are synced using connector
  • Email and Employee ID are mandatory fields.
No. Engagedly Request Fields Data Type BambooHR Response Fields Data Type
1. first_name string firstName string
2. middle_name string middleName string
3. last_name string lastName string
4. email string workEmail string
5. employee_id string employeeNumber string
6. joining_date date hireDate date
7. birth_date date dateOfBirth date
8. location string location list
9. job_title string jobTitle list
10. departments array of ids department List
11. manager_id string supervisorEId integer

Step: 9

All the changes you make on BambooHR will be updated on Engagedly in a span of five minutes.

Step: 10

You can find the changes that you made to users in BambooHR on Engagedly, through the ‘Users’ page.

Login to Engagedly >> Select Settings >> Click on the ‘Users’ in the Users/Groups section.

Step: 11

You can find all the active users by selecting ‘Active’ or ‘All’ in the drop-down list on the ‘Users’ page. You can find all the terminated employees by selecting ‘Blocked’ in the same drop-down.

Note: Before the integration happens, the super admin should enable Engagedly API and BambooHR API for a client and the Engagedly API should be linked to the client from the database


Personio

Follow the steps below to have a seamless data sync between Personio and Engagedly.

Step 1: Integration Process

Clients need to contact the support team with the below details

  1. Client ID and Secret key of their Organization account in Personio
  2. Set of attribute (field) mappings to be integrated into Engagedly

Step 2: Field Mappings

These are the field mappings in the current system. However, more field mappings can be implemented based on client requirements later.

Along with the field mappings, the client has to provide the settings like whether they want to

  • Sync only the active users
  • Sync all the users (active, onboarding, and inactive users)
  • Sync all the department, business unit, job titles, and locations details
No Personio Fields Engagedly Fields
1. First Name First Name
2. Last Name Last Name
3. Email Email
4. Gender Gender
5. Status Status
6. Position Job Title
7. Supervisor Reporting to
8. Hire date Date of Hire
9. Termination date Departure Date
10. Termination type Block Reason Code
11. Office Location
12. Department Department
13. Cost center Business unit
14. Profile Picture Profile Picture
15. Birthday Birthday
16. LinkedIn LinkedIn
17. Occupation type Employee type
18. Employee ID Employee ID

Step 3:
Our team will verify the integration with Personio.

Based on these details from the client, the engineering team will integrate the process of syncing all the user accounts from Personio to Engagedly. A CRON job will be implemented on daily basis. So that, the user accounts in Personio will be up to date in the Engagedly application.

  • Adding a new user
  • Updating the existing user details
  • Blocking or removing the users
  • Editing the Department, Cost Centers and other employee information present in your field mapping will be synced on the next scheduled CRON job

Personio User List:

Engagedly User List:


Namely

Below are the details on how to integrate Namely and Engagedly, in order to meet both the prior scenarios.

Note: Before beginning the integration process, make sure you are a ‘Site Administrator’ in Engagedly and are an ‘Administrator’ in Namely as well.

Syncing Users from Namely

Log into Engagedly as Site Administrator then navigate to Settings > Integration (under Organisation Section) > Namely.

Log into Namely as an Administrator then click on API from the header dropdown. If you do not get the API link, please contact Namely for further assistance.

Now in Namely, you have to create a permanent access token. To do that fill the input field with the name ‘Engagedly’ under ‘New Permanent Access Token’ section and click Create.

The above action will create an access token. The access token is only visible for a short period of time, so make sure you copy the access token first.

Then switch to Engagedly and go to the Namely Integration page. Paste the access token you copied beside the field Access Token, check ‘Enable Sync Users’ and fill the Organisation Subdomain field with the subdomain of your organization in Namely. Then, save the settings.

On saving the setting, a button ‘Sync User’ will appear on the bottom left corner of the form. Click the button to sync users. If all the settings are fine, Engagedly will start syncing the users. If not, you will receive an error message.

Single Sign On With Namely

Log into Engagedly as the Site Administrator, then navigate to Settings > Integration (under Organisation Section) > Namely. Copy the Redirect URL. We will be needing it.

Log into Namely as Administrator then click on API from the header dropdown. Now in Namely, you have to setup an OAuth2 application. To do that, click New Application under Your OAuth2 Applications.

Now fill up the form as:

Name: Engagedly

Website: https://engagedly.com

Redirect url: URL copied earlier on from Engagedly

Then click Submit.

The above action will create a new OAuth2 application. Click on to the Application and copy the Client Identifier and Client Secret.

Now go back to the Engagedly Namely Integration page. Paste the value of Client Identifier beside label Client Identifier and Client Secret beside label Client Secret, check Enable SSO, and fill the Organisation Subdomain field with the subdomain of your organization in Namely, then save the settings.

You have successfully delegated the authentication process of Engagedly to Namely, do not forget to have a test run before trying anything.


Google SSO

Follow the steps below to integrate with Google SSO

Step: 1

Log in to Engagedly as a Site Administrator. Go to Settings and click on SAML SSO

Now click on ‘+Add’ and fill in your organization name. Once you’re done filling in, click ‘Save’.

Now select the edit icon on the page that appears next.

This page is divided into two sections:

  1. Information that you need to enter copy from here and input IN the Identity Provider
  2. Information that you need to copy from the Identity Provider and input into Engagedly

Step: 2

Log in into Google as an admin (admin.google.com)> Click on App (You will find it either on Admin Console or under More Controls)

Step: 3

Click on SAML apps

Step: 4

Enable SSO for a SAML Application. You can either click on the link or the “+” button provided at the bottom right corner.

Step: 5

Honoring the above step a pop-up will appear, click on ‘SETUP MY OWN CUSTOM APP’.

Step: 6

The current pop-up provides two options to setup SSO.

From Option 1 please copy and paste the link as mentioned:

  • Copy the link called ‘SSO URL’, Go to Engagedly > SAML SSO page and paste this link beside the label ‘Identity Provider Single Sign-On URL’
  • Copy the link called ‘Entity ID’, go to Engagedly > SAML SSO page and paste this link beside the label ‘Identity Provider Issuer’
  • Download the certificate, open the certificate in any text editor copy the content, go to Engagedly > SAML SSO page and paste the content beside the label ‘Identity Provider X.509 Certificate’
  • ‘Enable SAML’ on the SAML SSO page in Engagedly by clicking on the check-box> Click on Save button.

Step: 7

Go back to the Google page that has the pop-up for SAML settings and click on Next.

Step: 8

Input the “Application Name” as Engagedly and description (optional) and logo (optional) If you choose to add the Engagedly logo please use the Engagedly logo from here:

https://engagedly.com/wp-content/uploads/2015/03/Logo-Engagedly13.png).

Click on Next

Step: 9

In the next pop-up you are required to provide 2 mandatory details: ACS URL and Entity ID. You will find these values in the SAML SSO page in Engagedly.

Copy and paste the link as mentioned below:

  • Copy the link “ACS URL” from Engagedly > SAML SSO and paste it on ACS URL field.
  • Copy the link Entity ID from Engagedly > SAML SSO and paste it on Entity ID field.

Keep the Start URL empty and check the signed response and click on Next.

Step: 10

You don’t have to do anything in the next pop-up, but just click Next and complete the process.

Step: 11

Now you are done with the integration process with Google SSO. Click on OK

Step: 12

Finally you need to enable the Engagedly app for all users from your Google Administrator account.

Now when users try to login from your custom Engagedly sub domain ( yourorganization.engagedly.com) they will get redirected to the standard Google Login page.


ADP Marketplace

Follow the steps below to integrate with ADP Marketplace

Step 1: Engagedly App in ADP Marketplace

The first step to purchasing Engagedly via the ADP marketplace is to look for the Engagedly app. In order to purchase the app through ADP, you must be an ADP client with a login.

Step 2: Purchase the Engagedly App

Once you’ve found the Engagedly app, click on ‘Start A Free Trial’ if you want to experience the app but are not yet sure about making the purchase.

If you want to sign up right away, click on ‘Choose An Edition to Purchase’. We have several options available and you can choose one based on your organization’s needs.

Step 3: Adding Users to the Engagedly App.

In this step, you will have to assign users to the Engagedly app. The Engagedly App will be visible to you in the list of app you have purchased.

Next to the Engagedly app, you will see a column of users who are a part of Engagedly. Select the users whom you want to add and then click on Save Changes.

Note: Only users who have been added at this stage can login to Engagedly through ADP.

Step 4: Updating User Demographics.

Updating user demographics can only be done through the Engagedly application at the moment. Follow the instructions here to update user demographics for individuals or a number of users at one go.