You are on page 1of 40

Integration Guide | PUBLIC

Document Version: 2H 2021 – 2022-04-28

Integrating SAP SuccessFactors Employee Central


with Microsoft Active Directory (SAP Cloud
Integration)
© 2022 SAP SE or an SAP affiliate company. All rights reserved.

THE BEST RUN


Content

1 Change History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2 Integration Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Understanding how this integration works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Business Process with Microsoft Active Directory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Use Cases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

3 Setting up HANA Cloud Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

4 Accessing the Solution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9


4.1 Configurations for Employee Central API. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

5 Employee Data Replication (Create User). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10


5.1 Integration Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Person Information [EC hris-element-id: personInfo]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Personal Information [EC hris-element-id: personInfo]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Phone Information [EC hris-element-id: phoneInfo]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Email Information [EC hris-element-id: emailInfo]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Job Information [EC hris-element-id: jobInformation]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.2 Integration Process Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.3 Value mapping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.4 Setting Up the Standard Data Integration (Create User). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

6 Employee Data Replication (Disable User). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20


6.1 Integration Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Person Information [EC hris-element-id: personInfo]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Personal Information [EC hris-element-id: personInfo]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Job Information [EC hris-element-id: jobInformation]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.2 Integration Process Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
6.3 Setting Up the Standard Data Integration (Disable User). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

7 Certificate-based Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.1 Creating a Key Pair. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.2 Registering Your OAuth2 Client Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
7.3 Deploying an OAuth2 SAML Bearer Assertion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

8 Limitations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34

9 Error Handling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
9.1 Setting Permissions for the Execution Manager Dashboard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
2 PUBLIC Content
9.2 Using the Execution Manager Dashboard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
9.3 Event Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Content PUBLIC 3
1 Change History

Learn about changes to the documentation for Integrating SAP SuccessFactors Employee Central with Microsoft
Active Directory (SAP Cloud Integration) in recent releases.

2H 2021

Type of Change Description More Info

Added Information on Certificate-based authen­ ● Certificate-based Authentication


tication for Create User and Disable User [page 28]
integrations. ● Registering Your OAuth2 Client Ap­
plication [page 30]
● Deploying an OAuth2 SAML Bearer
Assertion [page 32]

Changed Updated information for Certificate-based ● Setting Up the Standard Data Inte­
Authntication gration (Create User) [page 16]
● Setting Up the Standard Data Inte­
gration (Disable User) [page 24]

1H 2021

Type of Change Description More Info

Changed. The SAP Cloud Platform Integration brand


has been retired. We've updated this
guide with the new SAP Cloud Integration
brand accordingly.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
4 PUBLIC Change History
2 Integration Overview

This guide is for Professional Services, SAP consultants, and partner consultants to integrate SAP SuccessFactors
Employee Central with Microsoft Active Directory, which is deployed on-premise in the customer landscape inside
their firewall.

2.1 Understanding how this integration works


Guidelines described to successfully integrate SAP SuccessFactors Employee Central and Active Directory.

The integration of SAP SuccessFactors Employee Central and Active Directory process is customizable. It is
expected that you customize the process as per your business requirements. This means that the adjustments can
be made mainly to the Active Directory system setup. Also, the changes you make are specific to setting up the
destination profile, which reflects the Customers Active Directory system and these changes are to be done in the
mapping step. After the changes are made to the process, the profile must reflect the schema of the changed
Active Directory system.

1. Review the Employee Data Replication (Create User) chapter to understand how employee data from Employee
Central is mapped to data in Active Directory.
2. Set up Employee Central. For more information about Employee Central, see the Employee Central Master
Implementation Guide.
3. Make Active Directory specific settings.
4. Get access to the solution.
5. Set up the standard data integration.

2.2 Business Process with Microsoft Active Directory


Active Directory is a directory service that Microsoft developed for Windows domain networks and is included in
most Windows Server operating systems as a set of processes and services.

It is a directory (list) of network objects; it stores information about network components, that is, organizations,
sites, systems, users, or any other network object. It also includes the ability to record different types of
information about objects, for example, who accessed a network object and when.

Active Directory uses LDAP and DNS technology; it relies on DNS to locate objects within Active Directory. (DNS
provides name resolution between common names, that is, raw IP address and component name.)

The Active Directory domain controller authenticates and authorizes all users and computers in a domain type
network. Every employee in an organization should have an account in Active Directory to access the systems
(resources) in the origination network. (For example, when a user logs on to a computer that is part of the Windows
domain, Active Directory checks the submitted password and determines whether the user is allowed to log on to
the network and whether the user is an administrator or normal user.)
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Integration Overview PUBLIC 5
In the absence of a standard integration with Employee Central, the creation of an account in Active Directory is a
manual process, that is, a list of new hires for whom system access needs to be provided is emailed to the network
administrator, which involves a couple of approval processes before the accounts are created manually in Active
Directory. Maintaining the information in Active Directory in the case of a master data change, and disabling the
account in Active Directory in the case of an employee termination are also manual processes.

With the integration of Active Directory and Employee Central, the current manual process can be automated to
create a user account in Active Directory after a new hire event occurs in Employee Central, or a user account in
Active Directory can be disabled without manual intervention after an employee is terminated in Employee Central.

2.2.1 Use Cases

2.2.1.1 New Hire/Create a User

When a new employee is hired in Employee Central, a network user account has to be created automatically in
Active Directory for the new employee to log on to the network. The user account credentials for the new employee
need to be emailed to the HR administrator (appropriate contact).

 Note

Notification to the employee of the user account credentials is handled by the HR administrator based on the
company process and policies and is outside the scope of this integration.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
6 PUBLIC Integration Overview
2.2.1.2 Termination/Disable User

When an employee is terminated in Employee Central, a network user account in Active Directory has to be blocked
(disabled) automatically so that the network permission for that employee is revoked. The HR administrator
(appropriate contact) is notified of the account termination in Active Directory by email.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Integration Overview PUBLIC 7
3 Setting up HANA Cloud Connector

The SAP Cloud Integration cloud connector serves as the link between on-demand applications in SAP Cloud
Integration and existing on-premise systems.

Since Active Directory is within firewall, the Cloud Connector helps linking SAP Cloud Integration to Active
Directory. You can download the Cloud Connector from https://tools.hana.ondemand.com/#cloud
%C2%A0%C2%A0. To install the Cloud Connector, refer steps mentioned in https://help.sap.com/viewer/
cca91383641e40ffbe03bdc78f00f681/Cloud/en-US/57ae3d62f63440f7952e57bfcef948d3.html guide.

Steps to configure the cloud connector as a bridge in between SAP Cloud Integration and Active Directory.

1. Login to the Cloud Connector as an administrator.


1. To add an Account, click Add Account.
2. Click Connector from the left menu.
3. Click Add Account.
4. Under Add Account :
1. Select the Landscape Host from the drop down or enter a new Landscape Host.
2. Enter the Account Name as the Account Id of the landscape (SAP Cloud Integration tenant).

 Note

Account Id can be referred from the landscape cockpit.

3. Enter the Display name of your choice.


4. Enter the Account User with the user details who has the authorization’s for accessing the tenant.
5. Enter the Password of the above mentioned user.
6. If you are logging into the cloud connector for the first time enter the proxy settings in Location ID.
7. Click Save.
5. To configure the Access Control :
1. Click Cloud To On-Premise.
2. To add a new Access Control point, click + icon.
3. From the Back-end Type drop down, select Non-SAP System and click Next.
4. Select LDAPS as a protocol
5. Provide the internal host server details of External End point which is with in firewall
6. Internal port details of external end point
7. Click Next.
8. Click Next.
9. Click Finish.
6. To perform this step, ensure that you have the required Cloud Connector administrator privileges to create
an account for the tenant.
To confirm if the connection is established successfully:
1. Login to the tenant cockpit.
2. From the Global Account section, navigate to the tenant account.
3. From the Connectivity drop-down, select Cloud Connectors.
4. You will now see the exposed “Back End system” that you created in the above steps.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
8 PUBLIC Setting up HANA Cloud Connector
4 Accessing the Solution

The current solution is available only through the web UI of SAP Cloud Integration .

The following artifacts are available:

● Packaged Integration SAP SuccessFactors Employee Central to Microsoft Active Directory Create User
Account
● Packaged Integration SAP SuccessFactors Employee Central to Microsoft Active Directory Disable User
Account
● Packaged ValueMapping SAP SuccessFactors Employee Central to Microsoft Active Directory LocationCode

4.1 Configurations for Employee Central API

The EmpJob OData API for Employee Central extracts the employee data from Employee Central. It returns the
employee data in a hierarchically structured response XML.

The Employee Central data is fetched using the Employee Central OData API. To extract this data, you must enable
the OData API.

Prerequisites

You have enabled the OData API via Provisioning. The API user has admin access for the OData API. This
permission can be granted in Admin Tools. For more information about OData API configurations, see the
SuccessFactors HCM Suite OData API Programmer's Guide

 Note

Currently, location data is fetched via OData API. If you want to use location data, you must configure the OData
API.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Accessing the Solution PUBLIC 9
5 Employee Data Replication (Create User)

The replication of employee master data from Employee Central to Active Directory uses the OData service from
Employee Central. The data used for replication contains the following elements.

For Information About Compound Employee Element Struc­


ture … See Employee Central hris-element

Person Information Person Information [EC hris-element-id: personInfo]

Personal Information Personal Information [EC hris-element-id: personInfo]

Phone Information Phone Information [EC hris-element-id: phoneInfo]

Email Address Information E-Mail Information [EC hris-element-id: emailInfo]

Employment Information Job Information [EC hris-element-id: employmentInfo]

5.1 Integration Specification

The following tables list the Employee Central fields required to replicate Employee Central data via middle ware to
Active Directory. They also show which fields you need to map manually and the corresponding picklist IDs.
Descriptions are given of the mapping activities required.

5.1.1 Person Information [EC hris-element-id: personInfo]

Employee Central Obligatory for Code Mapping Re­ Active Directory


hris Field Description Replication? quired? Value Mapping Attribute

person_id_external Employee identifi- X Packaged Value­ sAMAccountName


cation number Mapping SAP Suc­
cessFactors Em­
ployee Central to
Microsoft Active Di­
rectory Location­
Code

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
10 PUBLIC Employee Data Replication (Create User)
5.1.2 Personal Information [EC hris-element-id: personInfo]

Employee Cen­ Obligatory for Code Mapping Constraint/ Active Direc­


tral hris Field Description Replication? Required? Constant Value Value Mapping tory Attribute

firstName First name X X Packaged Value­ givenName


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

lastName Last name X X Packaged Value­ sn


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

middleName Middle name X X Packaged Value­


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

First Name, Last Name, Middle Name

These fields are mapped in SAP Cloud Integration to the fields DistinguishedName, displayName, cn, and
userPrincipalName. DistinguishNameFormatting function uses the following to determine the distinguished name:

● Common Name Format


● Value Mapping table
● Employee Central fields First Name, Last Name, Middle Name, Person ID External, Location

The field DistinguishedName is determined as a combination of the common name format and the domain name.
Domain names are maintained as a Value Mapping table and are defined according to the location of the employee.

The field displayName is determined as a combination of first name and last name.

The field cn is determined according to the value of the Common Name Format.

The field userPrincipalName is derived from the combination of the Employee Central field Person ID External and
the domain name maintained in the Value Mapping table against the employee's location.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Create User) PUBLIC 11
5.1.3 Phone Information [EC hris-element-id: phoneInfo]

Only phone of type B = Business is transferred to Active Directory.

Employee Cen­ Obligatory for Code Mapping Constraint Active Direc­


tral hris Field Description Replication? Required? Value Value Mapping tory Attribute

phone_type Phone type X B = Business Packaged Value­


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

phone_number Phone number X Packaged Value­ telephoneNum­


Mapping SAP ber
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

5.1.4 Email Information [EC hris-element-id: emailInfo]

Only email of type B = Business is transferred to Active Directory.

Employee Cen­ Obligatory for Code Mapping Constraint Active Direc­


tral hris Field Description Replication? Required? Value Value Mapping tory Attribute

email-address Email address Packaged Value­ mail


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

email-type Email address B = Business Packaged Value­


type Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

email-type
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
12 PUBLIC Employee Data Replication (Create User)
The Employee Central field email-address is mapped to the field mail in the Active Directory request where email-
type is B (business).

5.1.5 Job Information [EC hris-element-id: jobInformation]

Employee Cen­ Obligatory for Code Mapping Constraint/ Active Direc­


tral hris Field Description Replication? Required? Constant Value Value Mapping tory Attribute

Location Location X Packaged Value­


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

Location

The Employee Central field Location is used to derive the domain name, domain path where the user accounts have
to be created in Active Directory, and also the email ID of the HR administrator to whom the notifications of the
process are to be sent.

 Note

The userAccountControl field of Microsoft Active Directory is mapped to constant 512.

5.2 Integration Process Overview

To understand the standard capabilities provided, the integration process as captured in SAP Cloud Integration is
described below.

Context

You need to adjust this process to your customer's needs.

The process can be explained as follows:

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Create User) PUBLIC 13
Procedure

1. Query to fetch data from Employee Central, The process checks if LastExecutionTime is provided in the
external parameters. If the external parameter does not hold any value, it checks for the earlier execution
stored in data store and sets the last execution date of the process with this data stored value. Otherwise the
process sets the last execution date of the process as the current date. Data query:

 Sample Code

&$filter=(eventNav/externalCode eq 'H' and ((lastModifiedDateTime ge


datetimeoffset'<LastExecutionDateTime> ' and createdDateTime ge
datetimeoffset'<LastExecutionDateTime> ')
or ((startDate ge datetime'<AdvancedDateOffset>' and startDate lt
datetime'<CurrentExecutionDate>') and (employmentNav/personNav/
personalInfoNav/startDate ge
datetime'<AdvancedDateOffset>' and employmentNav/personNav/personalInfoNav/
startDate le
datetime'<CurrentExecutionDate>')))&fromDate=<CurrentExecutionDate>&toDate=<Cu
rrentExecutionDate>

At the end of this step, Query build is successfully set up.


2. Fetch Data from SAP SuccessFactors Employee Central.
○ We set the current date and time and query the EMP JOB entity via an ODATA operation with depth of 5.
○ The ODATA operation has a dynamic filter whose value will be determined by the where clause that we
build above.
○ The data fetched as part of query is now sent for further processing.
3. LDAP call to Create user account, each document is processed individually as follows:

1. The process sets the following local properties : FIRSTNAME , LASTNAME , EMPLOYEEID, LOCATION.
These are used while creating a response message after successful processing of the create user request.
2. The process maps the SAP SuccessFactors EMP JOB entity data to create profile of LDAP.
This means that the fields in SAP Cloud Integration are mapped to the Active Directory fields,
DistinguishedName, displayName, cn, and userPrincipalName.
3. The process checks if the mandatory field location captured from Employee Central holds a reference in
the value mapping or not and then behaves accordingly:
○ If the location is not maintained ,the error message that is caught is routed to the Exception sub
process where an email message is compiled using this error message. Since the location code is not
maintained, the email is sent to the default email address. Email is sent per each Employee.
○ If the location is maintained, the data that is mapped in step b) is posted to LDAP server. If this LDAP
transaction is successful, a response message is constructed with details Employee Id , First Name ,
Last Name, Status, Message and Location. This response message is collated across all successful
transactions at LDAP. In case the transaction at LDAP results in an error it goes to exception sub
process where the email message is compiled and sent to HR email address that is configured against
the location.
4. Towards the end of the process all the successful transaction responses that were collated are used to
compile an email message and send it to the HR email address configured for that location.

 Note

In case if an email address is not configured for this location , the process sends an email to the
configured default email. If Default email address is also not maintained, the process will not be
sending any email.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
14 PUBLIC Employee Data Replication (Create User)
4. Map the content to Active Directory profile.
5. Find the delta run for the next execution.
During post processing of the messages, the data stored value/ persisted value is updated with the current
execution time. This is used to find the delta run for the next execution.

 Note

The data stored value is updated with current execution time for at least one successful LDAP transaction
and also if no data is fetched from Employee central.

6. Error Handling

If the employee is successfully created, then a successful message is logged in Execution Manager. Also, a
consolidated mail containing information of all successfully created employees is sent to the HR if the email
functionality is enabled. To enable email, set the external parameter ENABLEEMAIL to 1 if is not set it to 0.

 Note

The process status is completed, in spite of errors because the exceptions are handled.

If the employee is not created successfully, then a failure message is logged in Execution Manager. Also, mail
(s) containing information of all employees not successfully created is sent to the HR.

5.3 Value mapping

The Value mapping tables are translation tables between the Employee Central entries and the Active Directory
values.

To add or override the existing values, fill out the Value mapping tables as follows:

1. Navigate to Packaged Integration SAP SuccessFactors EmployeeCentral to ActiveDirectory - > Packaged


ValueMapping SAP SuccessFactors Employee Central to Microsoft Active Directory LocationCode .
2. The following fields have been mapped through a value mapping project in SAP Cloud Integration based on the
Location_Code of the employee:
○ UserDN Path
○ HR Email ID
○ Domain Name
You can modify the entries in this project to suit your needs.
The following Value mapping tables are available.

User DN Path, HR Email ID and Domain

In the first column, enter the Employee Central location code. In the next column, enter the User DN Path, HR Email
ID and Domain separated by semicolon (;).

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Create User) PUBLIC 15
The domain name is used to derive the user principal name. The HR Email ID is used to send the email notifications
of the process.

 Example

If the distinguished name of the user Carla Grant in Active Directory is CN=Carla
Grant,CN=User,DN=example,DN=com, the UserDN path field contains the path
CN=User,DN=example,DN=com that is, only the path and not the user information.

 Note

Points to consider:

● The value mapping has to be maintained for the location the user is getting created else the integrations
fails throwing an exception.
● If there is no HR Email ID to maintain for a location , then the second column must look like (userDN
Path;;Domain Name).

5.4 Setting Up the Standard Data Integration (Create User)

In this section, we discuss on steps required in configuring process integration for a new hire candidate on SAP
Cloud Integration.

Procedure

1. Launch the Web application by accessing the URL provided by SAP.


2. Click  > Discover.
3. Find the SuccessFactors Employee Central to ActiveDirectory package. Click Copy to Workspace to copy
SuccessFactors Employee Central to ActiveDirectory package to your workspace.
4. Click  > Design > SuccessFactors Employee Central to ActiveDirectory > Artifacts. A page with the
following artifacts is displayed:
○ Packaged Integration SuccessFactors Employee Central to Microsoft Active Directory Create User
Account
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
16 PUBLIC Employee Data Replication (Create User)
○ Packaged Integration SuccessFactors Employee Central to Microsoft Active Directory Disable User
Account
○ Packaged ValueMapping SuccessFactors Employee Central to Microsoft Active Directory
5. Click Packaged Integration SuccessFactors Employee Central to Microsoft Active Directory Create User
Account > Actions > Configure. A page with the following tabs is displayed:
○ Timer
○ Receiver
○ Parameters
6. Click the Timer tab. On this tab, you can schedule the integration based on the required business needs. The
following three options are available:
○ Run Once
○ Schedule on Day
○ Schedule to Recur

 Note

When testing the integration, it is recommended that you choose the Run Once option.

7. Click the Receiver tab.

Example

When you select SuccessFactors as the Receiver.

Update the fields as described below:

Field Action

Adapter Type By default the Adapter type is SAP SuccessFactors.

Address Enter the SAP SuccessFactors endpoint URL.

Authentication ○ Basic: This type authentication uses the User/Password


based authentication.
○ OAuth2 SAML Bearer Assertion: Here, OAuth2.0 author­
ization is used. If you want to connect to a system that
uses OAuth 2.0 authentication, you need to register and
deploy an OAuth2 Credential. For more information, re­
fer Related Information.

By default the Authentication Type is Basic Authentication.

Credential Name Enter the deployed SAP SuccessFactors credentials.

Example

When you select SuccessMailReceiver1 as the Receiver.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Create User) PUBLIC 17
Update the fields as described below:

Field Action

Adapter Type By default the Adapter type is Mail.

Address Enter the mail server details.

Authentication Type By default, the Authentication Type is "plain User/Pass­


word". You can select the appropriate Authentication Type
from the drop down.

Credential Name Enter the credentials for this mail server, if the Authentica­
tion Type is "plain User/Password".

From Enter the required From address.

To Enter the location based HR email ID or a default email ID to


receive the status of this integration.

In case the HR email ID of a location is not maintained in the


value mapping then, enter the default email address to
which the integration status has to be sent.

Example

When you select ActiveDirectory as the Receiver.

Update the fields as described below:

Field Action

Adapter Type By default the Adapter type is LDAP.

Address Enter the ActiveDirectory endpoint URL.

Credential Name Enter the deployed LDAP credentials.

8. Click the Parameters tab.

Update the fields as described below:

Field Action

EnableEmail Enter 1 to enable email notifications.

Enter 0 to disable email notifications.

Password Common password for all user accounts.

Ensure that the password you enter is in double quotes.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
18 PUBLIC Employee Data Replication (Create User)
Field Action

LastExecutionTimeStamp Enter the Last execution date and time. The date format is
YYYY-MM-DDT00:00:00.000Z.

FullNameFormat This option derives the full name formatting in Active Direc­
tory. The following Full Name type formatting's are now al­
lowed.
○ If FN=1 then format= FirstName (space) LastName
○ If FN=2 then format= FirstName (comma) LastName

AdvancedReplicationPeriod This enables you to replicate the employee data in advance


based on the specified period. This allows you to transfer the
new hire data into the active directory even before the start
date, there-by giving you sufficient time to configure the em­
ployee data for the new employee.

CommonNameFormat This option derives the common name formatting in Active


Directory. Formatting options are:
○ If CN=1 then format= FirstName + LastName
○ If CN=2 then format= FirstName + MiddleName + Last­
Name
○ If CN=3 then format= LastName + FirstName
○ If CN=4 then format= LastName + FirstName + Middle­
Name
○ If CN=5 then format= Employee Central Person_ID_Ex­
ternal
○ If CN=6 then format= FirstName.LastName

9. Save the configuration details.


10. Click Back to go to the catalog page listing all the artifacts.
11. Deploy the catalog by selecting Actions > Deploy.

Related Information

Registering Your OAuth2 Client Application [page 30]


Deploying an OAuth2 SAML Bearer Assertion [page 32]

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Create User) PUBLIC 19
6 Employee Data Replication (Disable User)

The replication of employee master data from Employee Central to Active Directory uses the OData service from
Employee Central. The data used for replication contains the following elements.

For Information About Compound Employee Element Struc­


ture … See Employee Central hris-element

Person Information Person Information [EC hris-element-id: personInfo]

Personal Information Personal Information [EC hris-element-id: personInfo]

Employment Information Job Information [EC hris-element-id: jobInformation]

6.1 Integration Specification

The following tables list the Employee Central fields required to replicate Employee Central data via middleware to
Active Directory.

They also show which fields you need to map manually and the corresponding picklist IDs. Descriptions are given of
the mapping activities required.

6.1.1 Person Information [EC hris-element-id: personInfo]

Employee Central Obligatory for Code Mapping Re­ Active Directory


hris Field Description Replication? quired? Value Mapping Attribute

person_id_external Employee identifi- X Packaged Value­


cation number Mapping SAP Suc­
cessFactors Em­
ployee Central to
Microsoft Active Di­
rectory Location­
Code

No further mapping activities are required for these fields.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
20 PUBLIC Employee Data Replication (Disable User)
6.1.2 Personal Information [EC hris-element-id: personInfo]

Employee Cen­ Obligatory for Code Mapping Constraint/ Active Direc­


tral hris Field Description Replication? Required? Constant Value Value Mapping tory Attribute

firstName First name X X Packaged Value­


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

lastName Last name X X Packaged Value­


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

middleName Middle name X X Packaged Value­


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

First Name, Last Name, Middle Name

These fields are mapped in SAP Cloud Integration to the field DistinguishedName. DistinguishNameFormatting
function uses the following to determine the distinguished name:

● Common Name Format


● Value Mapping table
● Employee Central fields First Name, Last Name, Middle Name, Person ID External, Location

The field DistinguishedName is determined as a combination of common name format and domain name. Domain
names are maintained as a Value Mapping table and are defined according to the location of the employee.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Disable User) PUBLIC 21
6.1.3 Job Information [EC hris-element-id: jobInformation]

Employee Cen­ Obligatory for Code Mapping Constraint/ Active Direc­


tral hris Field Description Replication? Required? Constant Value Value Mapping tory Attribute

Location Location X Packaged Value­


Mapping SAP
SuccessFactors
Employee Cen­
tral to Microsoft
Active Directory
LocationCode

Location

The Employee Central field Location is used to derive the domain name, domain path where the user accounts have
to be created in Active Directory, and also the email ID of the HR administrator to whom the notifications of the
process are to be sent.

 Note

The userAccountControl field of Microsoft Active Directory is mapped to constant 514.

6.2 Integration Process Overview

To understand the standard capabilities provided, the integration process as captured in SAP Cloud Integration is
described below.

Context

You need to adjust this process to your customer's needs.


The process can be explained as follows:

Procedure

1. Query to fetch data from Employee Central, The process checks if LastExecutionTime is provided in the
external parameters. If the external parameter does not hold any value, it checks for the earlier execution
stored in data store and sets the last execution date of the process with this data stored value. Otherwise the
process sets the last execution date of the process as the current date. Data query:
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
22 PUBLIC Employee Data Replication (Disable User)
 Sample Code

&$filter=(eventNav/externalCode eq '26' and ((lastModifiedDateTime


ge datetimeoffset'<LastExecutionDateTime> ' and createdDateTime
ge datetimeoffset'<LastExecutionDateTime> ') or (startDate ge
datetime'<LastExecutionDateTime> '
and startDate le
datetime'<CurrentExecutionDate>')))&fromDate=<CurrentExecutionDate>&toDate=<Cu
rrentExecutionDate>

At the end of this step, Query build is successfully set up.


2. Fetch Data from SAP SuccessFactors Employee Central.
○ We set the current date and time and query the EMP JOB entity via an ODATA operation with depth of 5.
○ The ODATA operation has a dynamic filter whose value will be determined by the where clause that we
build above.
○ The data fetched as part of query is now sent for further processing.
3. LDAP call to Disable user account, each document is processed individually as follows:

1. The process sets the following local properties : FIRSTNAME, LASTNAME, EMPLOYEEID, LOCATION. These
are used while creating a response message after successful processing of the disable user request.
2. The process maps the SAP SuccessFactors EMP JOB entity data to create profile of LDAP.
This means that the fields in SAP Cloud Integration are mapped to the Active Directory fields,
DistinguishedName, displayName, cn, and userPrincipalName.
3. The process checks if the mandatory field location captured from Employee Central holds a reference in
the value mapping or not and then behaves accordingly:
○ If the location is not maintained ,the error message that is caught is routed to the Exception sub
process where an email message is compiled using this error message. Since the location code is not
maintained, the email is sent to the default email address. Email is sent per each Employee.
○ If the location is maintained, the data that is mapped in step b) is posted to LDAP server. If this LDAP
transaction is successful, a response message is constructed with details Employee Id , First Name ,
Last Name, Status, Message and Location. This response message is collated across all successful
transactions at LDAP. In case the transaction at LDAP results in an error it goes to exception sub
process where the email message is compiled and sent to HR email address that is configured against
the location.
4. Towards the end of the process all the successful transaction responses that were collated are used to
compile an email message and send it to the HR email address configured for that location.

 Note

In case if an email address is not configured for this location, the process sends an email to the
configured default email. If Default email address is also not maintained, the process will not be
sending any email.

4. Map the content to Active Directory profile.


5. Find the delta run for the next execution.
During post processing of the messages, the data stored value/ persisted value is updated with the current
execution time. This is used to find the delta run for the next execution.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Disable User) PUBLIC 23
 Note

The data stored value is updated with current execution time for at least one successful LDAP transaction
and also if no data is fetched from Employee central.

6. Error Handling

If the employee is successfully disabled, then a successful message is logged in Execution Manager. Also, a
consolidated mail containing information of all successfully disabled employees is sent to the HR if the email
functionality is enabled. To enable email, set the external parameter ENABLEEMAIL to 1 if is not set it to 0.

 Note

The process status is completed, in spite of errors because the exceptions are handled.

If the employee is not disabled successfully, then a failure message is logged in Execution Manager. Also, mail
(s) containing information of all employees not successfully disabled is sent to the HR.

6.3 Setting Up the Standard Data Integration (Disable User)

In this section, we discuss on steps required in configuring process integration for a disable user on SAP Cloud
Integration, integration service.

Procedure

1. Launch the Web application by accessing the URL provided by SAP.


2. Click  > Discover.
3. Find the SuccessFactors Employee Central to ActiveDirectory package. Click Copy to Workspace to copy
SuccessFactors Employee Central to ActiveDirectory package to your workspace.
4. Click  > Design > SuccessFactors Employee Central to ActiveDirectory > Artifacts. A page with the
following artifacts is displayed:
○ Packaged Integration SuccessFactors Employee Central to Microsoft Active Directory Create User
Account
○ Packaged Integration SuccessFactors Employee Central to Microsoft Active Directory Disable User
Account
○ Packaged ValueMapping Successfactors Employee Central to Microsoft Active Directory
LocationCode
5. Click Packaged Integration SuccessFactors Employee Central to Microsoft Active Directory Disable User
Account > Actions > Configure. A page with the following tabs is displayed:
○ Timer
○ Receiver
○ Parameters
6. Click the Timer tab. On this tab, you can schedule the integration based on the required business needs. The
following three options are available:
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
24 PUBLIC Employee Data Replication (Disable User)
○ Run Once
○ Schedule on Day
○ Schedule to Recur

 Note

When testing the integration, it is recommended that you choose the Run Once option.

7. Click the Receiver tab.

Example

When you select SuccessFactors as the Receiver.

Update the fields as described below:

Field Action

Adapter Type By default the Adapter type is SuccessFactors.

Address Enter the SuccessFactors endpoint URL.

Authentication ○ Basic: This type authentication uses the User/Password


based authentication.
○ OAuth2 SAML Bearer Assertion: Here, OAuth2.0 author­
ization is used. If you want to connect to a system that
uses OAuth 2.0 authentication, you need to register and
deploy an OAuth2 Credential. For more information, re­
fer Related Information.

Credential Name Enter the SuccessFactors credentials.

Example

When you select ActiveDirectory as the Receiver.

Update the fields as described below:

Field Action

Adapter Type By default the Adapter type is LDAP.

Address Enter the Hostname of Active Directory server and port


number 636 (Active Directory uses TCP port 636 for se­
cured communication).

Credential Name Enter the deployed LDAP Credentials.

Example

When you select ExecutionManagerSuccess as the Receiver.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Disable User) PUBLIC 25
Update the fields as described below:

Field Action

Adapter Type By default the Adapter type is SuccessFactors.

Address Enter the SuccessFactors endpoint URL.

Authentication Type By default the Authentication Type is Basic Authentication.

Credential Name Enter the deployed SuccessFactors credentials.

8. Click the Parameters tab.

Update the fields as described below:

Field Action

EnableEmail Enter 1 to enable email notifications.

Enter 0 to disable email notifications.

CommonNameFormat This option derives the common name formatting in Active


Directory. Formatting options are:

○ If CN=1 then format= FirstName + LastName


○ If CN=2 then format= FirstName + MiddleName + Last­
Name
○ If CN=3 then format= LastName + FirstName
○ If CN=4 then format= LastName + FirstName + Middle­
Name
○ If CN=5 then format= Employee Central Person_ID_Ex­
ternal
○ If CN=6 then format= FirstName.LastName

LastExecutionTimeStamp Enter the Last execution date and time. The date format is
YYYY-MM-DDT00:00:00.000Z.

FullNameFormat This option derives the full name formatting in Active Direc­
tory. The following Full Name type formatting's are now al­
lowed.

○ If FN=1 then format= FirstName (space) LastName


○ If FN=2 then format= FirstName (comma) LastName

9. Save the configuration details.


10. Click Back to go to the catalog page listing all the artifacts.
11. Deploy the catalog by selecting Actions > Deploy.

Related Information

Registering Your OAuth2 Client Application [page 30]


Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
26 PUBLIC Employee Data Replication (Disable User)
Deploying an OAuth2 SAML Bearer Assertion [page 32]

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Employee Data Replication (Disable User) PUBLIC 27
7 Certificate-based Authentication

Certificate-based authentication provides a more secure form of authentication option to its users. Compared to
HTTP Basic Authentication, Certificate based Authentication is more secure as it doesn't require users to provide
their passwords during authentication.

To successfully apply certificate-based authentication, you must complete the following configurations:

● Registering Your OAuth2 Client Application


● Deploying an OAuth2 SAML Bearer Assertion

7.1 Creating a Key Pair

Context

You create a key pair to use it for SSL, decryption, signature, and client certificate authentication.

Procedure

1. In the Operations view, choose Manage Security Keystore .

2. In the Current tab, choose Create Key Pair .


3. In the next screen, enter the required information.

Attribute Description

Alias Alias for the artifact that you want to create. The alias must
be unique. You can't create an alias that is already existing in
the tenant for another key pair.

Key Type RSA

Key Size Choose a key size based on your requirement. By default,


the value is set to 2048.

Signature Algorithm The signature algorithm is set to SHA-512/RSA since you


have selected the Key Type as RSA.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
28 PUBLIC Certificate-based Authentication
Attribute Description

Common Name (CN) Provide a common name for the technical user. You use this
common name while deploying an OAuth2 credential.

Organizational Unit (OU) (Optional): Enter the department name within your organiza­
tion.

Organization (O) (Optional): Enter the name of your organization.

Location (L) (Optional): Enter the name of the city or town.

State or Province (ST) (Optional): Enter the name of your state or province.

Country/Region (C) Enter the two-letter ISO code for the country.

E-Mail (E) (Optional): Enter the email address associated to the user.

Valid From Enter the date from which you want the key pair to be active.

Valid Until Enter the date until which you want the key pair to be active.

For more information on certificates, refer X.509 Certificates in Related Information.

4. Choose Create.

Results

The Key Pair is successfully created and is listed under the Current tab in the Overview page.

Next Steps

● Select the newly created Key Pair and choose the  (Actions) icon, then select Download Certificate.
Alternatively, you can click the keystore entry alias to open the details, and then choose the option under
Download.
● Open the .cer file, the X.509 certificate is a BASE64-encoded string enclosed between -----BEGIN
CERTIFICATE----- and -----END CERTIFICATE-----. Copy only the enclosed string without the
beginning and ending lines. Otherwise, an error occurs. You will need this string when registering an OAuth2
Client in the SAP SuccessFactors instance.

Related Information

X.509 Certificates
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Certificate-based Authentication PUBLIC 29
7.2 Registering Your OAuth2 Client Application

Prerequisites

● You've created a Key Pair and you have its corresponding certificate information.
● You have the Manage Integration Tools Manage OAuth2 Client Applications permission.

Procedure

1. Log into your instance as an administrator.

2. Go to Admin Center Manage OAuth2 Client Applications and choose Register Client Application. You can
also access the tool by searching in Action Search.
3. On the new OAuth client registration screen, enter the following information:

Option Description

Company The name of your company. This value is prefilled based on


the instance of the company currently logged in.

Application Name (Required) A unique name of your OAuth client.

Description (Optional) A description of your application.

Application URL (Required) A unique URL of the page that the client wants to
display to the end user. The page contains more information
about the client application. This is needed for 3-legged
OAuth, however it isn’t currently supported.

Bind to Users (Optional) You can enable this option to restrict the access
of the application to specific users including business users
and technical users.

User IDs (Required if you enabled the Bind to User option) Enter the
user IDs separated by comma.

The binding of business users and technical users works as


follows:

○ If you don't bind any user to the application, all business


users can request OAuth tokens but technical users
can't.
○ If you bind both business users and technical users to
the application, only these users can request OAuth to­
kens.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
30 PUBLIC Certificate-based Authentication
Option Description

○ If you bind only technical users to the application, these


technical users and any business user can request
OAuth tokens.
○ If you bind only business users to the application, only
these users can request OAuth tokens.

 Note
Contact your system administrator or Product Support
if you don't know the technical user ID of your instance.

X.509 Certificate (Required) To register a client application, enter the certifi-


cate information that you retreived from the .cer file when
creating the Key Pair. Only select the string enclosed be­
tween -----BEGIN CERTIFICATE----- and -----
END CERTIFICATE-----. Enter only the enclosed string
without the beginning and ending lines.

 Note
When you change or regenerate an X.509 certificate for
an application, the existing application client configura-
tions are invalidated. This could lead to application fail­
ure until you update the configurations with the new cer­
tificate information.

4. Choose Register to save your registration.

Results

You’ve successfully registered your client application for OAuth2 authentication. An API Key is generated and
assigned to your application. You can view the API Key by choosing View on the registered application list. This API
Key is used in the deployment of OAuth2 SAML Bearer Assertion.

You can also edit, disable, and delete an OAuth2 client registration.

Related Information

Deploying an OAuth2 SAML Bearer Assertion [page 32]


Creating a Key Pair [page 28]

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Certificate-based Authentication PUBLIC 31
7.3 Deploying an OAuth2 SAML Bearer Assertion

If you want to connect to a system that uses OAuth 2.0 authentication, you need to deploy an OAuth2 Credentials
artifact using the following procedure.

Prerequisites

● An API Key generated from the Registering Your OAuth2 Client Application procedure.
● The Alias name used to create a Key Pair from the Creating A Key Pair procedure.

Procedure

1. In the Operations view, choose Manage Security Security Material .

2. Choose Create OAuth2 SAML Bearer Assertion .


3. Specify the following attributes:

Attribute Description

Name Name for the artifact that you want to deploy on the tenant.

Grant Type The grant type is OAuth2SAMLBearerAssertion that is un­


editable.

Description Description of the artifact name you're deploying on the ten­


ant.

Audience Provide the host name of the target system, to which you
want to establish the connection.

 Example
www.successfactors.com

Client Key A unique identifier created by the target system to identify


the client. Use the API Key that was generated in the Regis­
tering Your OAuth2 Client Application procedure. For more
information, refer Related Information.

 Note
Every time you edit an OAuth2 credentials artifact, you
must re-enter the client key.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
32 PUBLIC Certificate-based Authentication
Attribute Description

Token Service URL Provide the URL that generates OAuth2 token for the regis­
tered OAuth2 client.

Target System Type Specify the relevant host system for authenticating the user
against the system. Select SAP SuccessFactors

Company ID Specify the company ID of your SuccessFactors instance.

(only if you select SuccessFactors for target system type)

User ID Key Pair Common Name (CN)

(only if you select SuccessFactors for target system type)

Key Pair Alias Provide the alias name that you defined in the prerequisites.

(only if you select SuccessFactors for target system type and


Key Pair Common Name (CN) for user ID)

4. Choose Deploy.

Related Information

Creating a Key Pair [page 28]


Registering Your OAuth2 Client Application [page 30]

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Certificate-based Authentication PUBLIC 33
8 Limitations

Only the new hire and termination scenarios are supported in the current release.

Rehire, transfer, and data changes are out of scope. Activating an inactive account in Active Directory is not
supported. The distinguished name (that is, the key in Active Directory to uniquely identify the user) is not stored in
the middleware. This means that whenever a user needs to be created or disabled, the distinguished name is built
in the middleware based on the configuration. We therefore strongly recommend not changing the formatting
option once initially decided or set. The common name formatting settings must be the same for both create and
disable user account processes.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
34 PUBLIC Limitations
9 Error Handling

The prepackaged integration uses EC Execution Manager (XM) monitoring tool to show the errors that may occur
during replication. We also recommend using the CPI Monitor for the monitoring of integration.

During the integration if there are any employee records that fail to be processed then this integration captures the
specific person id external field with the appropriate error message in Execution Manager.

9.1 Setting Permissions for the Execution Manager


Dashboard

Execution Manager (XM) is an admin opt-in tool that does not require provisioning to be enabled. To set up role
based permissions for your permission group to have access, follow these steps:

Procedure

1. Go to Admin Center Manage Permission Roles that directs you to the Permission Role List page.
2. Select the Permission Role group you want to edit that directs you to the Permission Role Detail page.
3. Select Permission button that opens up the Permission Settings box.

4. Go to Administrator Permissions Admin Center Permissions and select these two options:

○ Read Execution Manager Events


○ Read Execution Manager Event Payload
5. Select Done to save, which direct you back to the Permission Role Details page.
6. Select Save Changes to finish.

9.2 Using the Execution Manager Dashboard

The Execution Manager Dashboard can be accessed either from oneAdmin or from NextGen UI.

How to Access Execution Manager Dashboard

For oneAdmin users, you can access it by entering in Execution Manager Dashboard in the Tool Search box.
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Error Handling PUBLIC 35
For NextGen users, you can access it by clicking on the See More link available on the tiles that correspond to
Scheduled Jobs and Integration Center. The NextGen Admin page also displays Scheduled Jobs and Integration
Center tiles with data of the last 7 days.

Integration Center and Scheduled Jobs featured

Execution Manager Dashboard

The Execution Manager Dashboard supports three tabs:

● Scheduled Jobs
● Integration Center
● Middleware Integrations

Each section has its own set of graphs and a table that displays the data on the graph. The graph shows jobs that
fail or been successful. For all integrations using SAP Cloud Integration tool is captured by the Middleware
Integrations tab.

Using Filters

This dashboard has two filters to narrow down your search results:

1. Timeframe: Last 24 hours, Last 7 days, Last 30 days, and Custom Date Range.
2. All, Error.

Viewing Error Details

Below the Middleware Integrations graph, there is a table that displays all processes that match your search criteria.
You can see the detailed view of your event by selecting the empty space before the Process Identifier.
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
36 PUBLIC Error Handling
We have the following Process States:

● Completed_Successfully
● Completed_With_Errors
● Completed_With_Warnings
● FAILED

When you select the process you want to view, it directs you to the Event Details page.

9.3 Event Details

The Event Details is where you can view specifics on your integration event. If your event has any payload, you can
download as a text file.

Event Details

Column Header Name Description

Event Name The event name is listed here with the date and time stamp
when it ran.

Event Description Description of the event. You can hover over the linked text to
read the entire description. If you select the linked text, a box
opens up with more information about your event.

Event Type If your process does not have errors, this label is displayed:

● Summary_So_Far

If your process has errors, the following label is displayed:

● ERROR: event was not successful.

You can select the Event Description for more information


about that label.

Created Date Date that this event was logged.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Error Handling PUBLIC 37
Important Disclaimers and Legal Information

Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:

● Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your agreements
with SAP) to this:

● The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
● SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.

● Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering a SAP-hosted Web site. By using such links, you
agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this information.

Videos Hosted on External Platforms


Some videos may point to third-party video hosting platforms. SAP cannot guarantee the future availability of videos stored on these platforms. Furthermore, any
advertisements or other content hosted on these platforms (for example, suggested videos or by navigating to other videos hosted on the same site), are not within the
control or responsibility of SAP.

Beta and Other Experimental Features


Experimental features are not part of the officially delivered scope that SAP guarantees for future releases. This means that experimental features may be changed by SAP at
any time for any reason without notice. Experimental features are not for productive use. You may not demonstrate, test, examine, evaluate or otherwise use the
experimental features in a live operating environment or with data that has not been sufficiently backed up.
The purpose of experimental features is to get feedback early on, allowing customers and partners to influence the future product accordingly. By providing your feedback
(e.g. in the SAP Community), you accept that intellectual property rights of the contributions or derivative works shall remain the exclusive property of SAP.

Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax and
phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of example
code unless damages have been caused by SAP's gross negligence or willful misconduct.

Bias-Free Language
SAP supports a culture of diversity and inclusion. Whenever possible, we use unbiased language in our documentation to refer to people of all cultures, ethnicities, genders,
and abilities.

Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
38 PUBLIC Important Disclaimers and Legal Information
Integrating SAP SuccessFactors Employee Central with Microsoft Active Directory (SAP
Cloud Integration)
Important Disclaimers and Legal Information PUBLIC 39
www.sap.com/contactsap

© 2022 SAP SE or an SAP affiliate company. All rights reserved.

No part of this publication may be reproduced or transmitted in any form


or for any purpose without the express permission of SAP SE or an SAP
affiliate company. The information contained herein may be changed
without prior notice.

Some software products marketed by SAP SE and its distributors


contain proprietary software components of other software vendors.
National product specifications may vary.

These materials are provided by SAP SE or an SAP affiliate company for


informational purposes only, without representation or warranty of any
kind, and SAP or its affiliated companies shall not be liable for errors or
omissions with respect to the materials. The only warranties for SAP or
SAP affiliate company products and services are those that are set forth
in the express warranty statements accompanying such products and
services, if any. Nothing herein should be construed as constituting an
additional warranty.

SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.

Please see https://www.sap.com/about/legal/trademark.html for


additional trademark information and notices.

THE BEST RUN

You might also like