Implementation
Prepare to add the departments and assign data collectors (associates) to departments to efficiently complete the initial implementation of Pega Workforce Intelligence.
The Service Delivery Team supports the initial implementation and configuration of Workforce Intelligence, which includes the following tasks:
- Connecting to Workforce Intelligence
The Service Delivery Team instructs you on how to connect to the Workforce Intelligence database and guides you through the various implementation tasks. For more information, see Implementing Workforce Intelligence.
- Importing your hierarchy
For reporting purposes, you must have up-to-date information about the departments and employees who comprise the organizational structure in Workforce Intelligence. Always use your system of record, such as a Human Resources system, a payroll application, or some other application, as the source for user information. Using a system of record ensures that you have the most up-to-date information in Workforce Intelligence. After you identify your systems of record, as the administrator, you can import the hierarchy. The Service Delivery Team can also provide assistance with your initial hierarchy import.
- Before you begin the initial hierarchy import
Complete initial preparation and planning tasks outside of Pega Workforce Intelligence before the initial import to make the process run more efficiently.
- Importing the business unit hierarchy for initial implementation
Efficiently add your business unit hierarchy on a schedule that works best for you by using the .csv file template and import process. Import the business units from your chosen external system of record.
- Importing data collectors for initial implementation
Save time during the assignment process by importing data collectors and assigning them to the departments in your hierarchy.
- Enabling OAuth for data collectors
For additional security of your Pega Robot Runtime 19.1.63 or later, enable endpoint authorization through OAuth tokens to secure Robot Runtime routes or the API endpoints with which interacts. With this feature, the Robot Runtime endpoints are securely authorized by using a client ID and client secret combination for each data collector (user with Robot Runtime installed).
Previous topic Build numbers Next topic Before you begin the initial hierarchy import