Ceridian Dayforce
Connector name |
|
Connector type | This connector consists of a Python script, |
Type (UI field value) | Ceridian Dayforce |
Connector status / support | Bravura Security-Verified This connector has been tested and is fully supported by Bravura Security. |
Upgrade notes | The Bravura Security-Verified scripted connector was added in Connector Pack 4.7.0. The Customer-Verified The The new |
The following Bravura Security Fabric operations are supported by Ceridian Dayforce connector:
list account attributes
List:
accounts
attributes
For a full list and explanation of each connector operation, see connector operations.
Preparation
Before you can target Ceridian Dayforce, you must set up a target administrator.
Ensure that a user account has been created within Ceridian Dayforce that is an administrative user and has access to list Dayforce users.
Targeting the Ceridian Dayforce system
For each Ceridian Dayforce system, add a target system in Bravura Security Fabric (Manage the System > Resources > Target systems):
Type is Ceridian Dayforce
Address uses options described in the table below:
Options marked with a
are required.
Option | Description |
|---|---|
Script file: | The pre-set agtdayforce.py script file used by the Dayforce connector. (key: script) |
URL: | The domain name URL for the Dayforce server. This is used for API calls other than authentication. (key: server) |
Authentication URL: | The domain name URL for the Dayforce authentication server. This is used for API calls that are specifically for authentication. (key: authServer) |
Company ID: | The Company ID on the Dayforce server that will be used to target. (key: companyId) |
Expanders to use for listing: | This is a comma-separated list that is used for additional fields to use to query on for details when listing. Example: "WorkAssignments,Contacts". See here for more information regarding Dayforce API documentation for possible expanders. (key: expanders) |
Numbers of threads to use for listing: | Specifies the number of threads. If no value is specified then three threads are used when listing. Dayforce can scale how many servers they have available for handling API calls so this option will allow to increase the number of threads to make use of them. However note that Dayforce does aggressively rate limit their API calls and significantly surpassing their rate limits can lead to exponential delays and potentially the server that runs the connector being temporarily IP blocked by Dayforce. See here for more information. (key: threads) |
Trace Logging: | Provides detailed multiline logging for connectors. Default is None. Other options include Low, Medium, and High. (key: trace) |
The full list of target parameters is explained in Target System Options.
The Trace Logging option provides detailed multi-line logging for the connectors and exposes a way to engage trace logging to a file. Trace logging are things that are generally multi-line such as input/output kvg options, http request/response data, and generally verbose data for diagnosing and troubleshooting issues. It provide a simple mechanism to redirect multi-lined information to an output file.
A trace log file is created within the <Program Files path>\Bravura Security\Bravura Security Fabric\Logs\<instance> directory and has a format of trc-<connector-name>-<unix-time>-<process-id>.log.
The Trace Logging option can be found in the advanced section when modifying the target system address configuration page for individual target systems. It can be set to the following values:
None | Default value. Log no trace information and no trace log file is created. |
Low | Contains kvgroup data for the Input KVG and for the Output KVG. |
Medium | Telemetry data for Http Post/Get request/response data. |
High | Not yet used, to be implemented in a future release. |
(key: trace)
Handling account attributes
You can view the complete list of attributes that Bravura Security Fabric can manage, including native and pseudo-attributes, using the Manage the system (PSA) module. To do this, select Ceridian Dayforce from the Manage the system > Resources > Account attributes > Target system type menu.
The attributes that are used to list are also currently defined in the agtdayforce.py script file by their json paths, for example:
# json path for attributes we want to list
global jsonPathAttributeMapping
jsonPathAttributeMapping = {
"DateOfBirth": "$.Data.BirthDate",
"EmployeeNumber": "$.Data.EmployeeNumber",
"BusinessEmail": "$.Data.Contacts.Items[?(@.ContactInformationType.LongName =~ 'Business')].ElectronicAddress"
}Any desired attributes should be added to this section of the script with the attribute's name and the json path to where its value resides in the API call’s output.
For information about the native Ceridian Dayforce attributes managed by Bravura Security Fabric, consult your Ceridian Dayforce documentation.