System Requirements

The TechWolf Skills integration will make use of existing Workday functionality. The customer will need a TechWolf contract with a live TechWolf tenant. This TechWolf tenant must be populated with (a subset of) the worker’s entities in Workday.

Workday Configuration

A Workday integration user must be configured in the Workday tenant with an implementation security group.
This step can be skipped if there is already a Job Skill Sync Integration configured. In this case, the same ISU can be used and only the Integration Permissions need to be updated in step 4.

Authentication

The integration uses OAuth authentication for enhanced security. New users should follow all the setup steps below (Basic Authentication + OAuth configuration). If you already have Basic Authentication configured, you can continue using it. What you’ll share with TechWolf:
  • Client ID, client secret, and refresh token
  • Workday API URL

Basic Authentication Setup

  1. Create Integration System User (ISU)
    • Create Integration System User business process.
    • Do not allow UI sessions as this user will only be used for automations.
    • Please securely store the username and password of this user.
  2. Update password expiration rules for ISU
    • In the Maintain Password Rules business process under “System Users exempt from password expiration” add the newly created ISU to the list.
    • Note: This ensures the integrations will keep running without interruptions due to password expiration.
    Maintain Password Rules
  3. Set up security permissions for the ISU through security policies
    • Go to Create Security Group, choose “Integration System Security Group (Unconstrained)”.
    • Note on acceptance testing: Consider using two different security groups, one Unconstrained and one Constrained. This way, the test-set is scoped while the correct permissions are applied for other Web Services.
    Create Security Group Create Security Group Detail
    • The next screen presents you with an Edit form to add additional information. Add your ISU to the list. This can be changed later too. Do not check “Inactive”.
    Edit Security Group
  1. Edit the Security Group’s domain security policies
    • Search for “View Security Group” and select your created security group. View Security Group
    • Select the option menu next to the Security Group’s name, go to “Security Group” and select “Maintain Domain Permissions for Security Group”.
    View Security Group Action
    • Under Integration Permissions add the following Domain Security Policies, and run the Activate Pending Security Policy Changes task to apply the changes.
    Domain Security PolicyAccess
    Manage: External SkillsPut
    Person Data: SkillsPut
    Set up: Skills and ExperiencePut
    Worker Data: Public Worker ReportsGet
  1. Find out the correct Workday API URL
    • Search for Public Web Services in the search bar at the top of the Workday home page.
    • In the list, click the three dots next to the Human Resources (public) entry. select View WSDL under Web Service. View wsdl
    • The resulting page will take some time to load. Once it is loaded, look for “soapbind:address location” near the bottom of the page and copy the URL you find next to it.
    • Note that the API URL can differ between implementation tenants and production tenants, so the steps described above need to be repeated for each tenant individually.

OAuth Authentication Setup

OAuth users must complete the Basic Authentication steps above first, then follow these additional OAuth-specific steps.
  1. Create API Client for Integrations
    • Search for “Register API Client for Integrations” business process
    • Enable non-expiring refresh tokens to ensure continuity of service
    • Add the appropriate scopes (Staffing)
    API Client Setup
    • Securely store the client ID and client secret
    API Client Credentials
  2. Generate Refresh Token
    • Search for “View API Clients” report
    • Click “API Clients for Integrations” tab
    • Note down the token endpoint. You will need to share this later.
    API Client Refresh Token
    • Find your API client and select “Manage Refresh Tokens for Integrations”
    • Under “Workday Account”, type in your ISU
    • Press OK
    • Check the box “Generate new refresh token”
    • Press OK
    • Securely store the refresh token.
Keep your OAuth credentials secure and share them only with TechWolf through secure channels.
When the authentication credentials and Workday API URL are shared, the setup is complete on the customer’s Workday tenant. TechWolf will validate that the ISU has the required permissions and that the API URL is correct.

TechWolf Configuration

The TechWolf tenant will be configured by TechWolf itself.
  1. In the integration service on the TechWolf side, TechWolf adds the credentials of the customer-created ISU.
  2. TechWolf adds TechWolf API credentials with correct scopes to have access to the TechWolf API and links that TechWolf tenant to a Workday tenant.
  3. In communication with the customer, TechWolf or the customer inserts Employees into the TechWolf API, corresponding to the Workday Workers to which the integration is scoped.

Linking Workday & TechWolf

This section is only required if the customer is NOT using the Workday ID as the API ID in TechWolf.

Seamless Matching of Employee IDs

A critical aspect of this process is the seamless coupling of Employee IDs across both platforms. There are two options for direct ID matching:
  1. Using Employee IDs: If you want to use Workday Employee IDs as the identifier field in Workday, then this same ID must also be used as the Employee external_id in TechWolf.
  2. Using Workday IDs (WIDs): If you want to use Workday IDs as the identifier field in Workday, then this same ID must also be used as the Employee external_id in TechWolf.
If neither of these direct matching approaches is possible, then the IDs must be linked through custom properties.

Creating Custom Properties

  • For each Employee in the TechWolf system, introduce a new custom property such as employee_workday_id. This property will store the corresponding Workday ID of the Employee.
  • Detailed instructions for creating new custom property definitions can be found here .

Setting Custom Property Values

  • Once the custom property is defined, assign the Workday ID to each Employee’s TechWolf profile.
  • Steps for setting these values are outlined here .
During a pilot phase, it is possible to manually establish a link between TechWolf IDs and Workday IDs for each Employee. While this approach is feasible for a limited scope, it lacks scalability for broader deployment.

Deployment Methodology

The following tasks and responsibilities assume that:
  1. The customer has the appropriate TechWolf API license(s).
  2. The TechWolf API contains all Employee information corresponding to Workday workers and data from other external systems.
  3. A Skill Profile validation tool (e.g., MS Teams bot) is set up and configured (see separate deployment guide).

Deployment Tasks & Responsibilities

  1. Customer: Create Integration System User (ISU) based on workflow described above.
  2. Customer: Choose and configure authentication method (Basic or OAuth).
  3. Customer: Share authentication credentials with TechWolf:
    • For Basic Authentication: ISU username and password
    • For OAuth Authentication: client ID, client secret, and refresh token
  4. Customer: Share Workday API URL with TechWolf.
  5. TechWolf: Run initial sync of worker profiles with TechWolf API.
  6. TechWolf: Setup tenant configuration and start bidirectional sync process.
  7. Customer: Check end-user test scenarios.

Customer / User Acceptance Testing

Tests will be conducted on the production environment using a constrained Integration System Security Group. The Security Group should be constrained to the select number of workers that will perform the user acceptance testing. An overview of the acceptance tests can be found in the “Test Scenarios” Excel - “Testing as an end-user” sheet. To promote the configuration to production, an unconstrained Integration System Security Group should be created and added to the ISU. This allows TechWolf to read and update all worker Skill profiles. User acceptance testing is done on the production or sandbox tenant, with a constrained security group.