Rooster - HackerRank integration
Last updated: January 22, 2025
HackerRank Side
1. Generate an API Token for Rooster
Use the partner header provided for this configuration.
2. Configure Workday-Specific Credentials
Username and Password: Use the credentials for the Integration System User created in Workday.
Endpoint Configuration:
Locate the Public Web Services report in your Workday tenant.
Navigate to the Recruiting (Public) Web Service.
Perform the following:
Click the Related Actions menu.
Navigate to Web Service > View WSDL.
Identify the URL under the soapbind:address tag.
3. Configure Interview Ratings
Obtain Interview Rating IDs from Workday that correspond to:
Pass
Fail
To configure ratings initially:
Use the Maintain Interview Feedback Ratings task.
Later, use the same task to update feedback descriptions if needed.
To manage reference IDs for the Interview Feedback Rating business object:
Access the Maintain Reference IDs task.
Note: If your Workday tenant changes, update your credentials with the HackerRank team to avoid disruptions.
Workday Side
1. Integration System User Configuration
Access the Create Integration System User task.
Configure a new user account:
Name: HackerRank_Interview_Integration_Rooster
Password: Create and securely store it.
Set Session Timeout Minutes to 0.
Enable Do Not Allow UI Sessions.
2. Create Integration System Security Groups
Access the Create Security Group task.
Create an Integration System Security Group (Unconstrained):
Name: ISSG_HackerRank_Interview_Integration_Rooster
Assign the previously created Integration System User.
3. Edit Domain Security Policies
Grant required access to the following domains:
Interview Integrations
Candidate Data: Interview Schedule
Candidate Data: Interview Feedback Results
Worker Data: Public Worker Reports
Person Data: Work Contact Information
Steps:
Access the View Domain report.
Perform a Related Action on the domain:
Select Domain > Edit Security Policy Permissions.
Add the Security Group to the necessary permissions.
Assign Get, Put, View, and/or Modify permissions as applicable.
Activate the changes:
Use the Activate Pending Security Policy Changes task.
Provide a comment and confirm activation.
4. Manage Password Rules
Access the Maintain Password Rules task.
Add the Integration System User to the System Users Exempt from Password Expiration field.
5. Manage Authentication Policies for API Access
Navigate to the Manage Authentication Policies task.
Edit the authentication policy for the current environment:
Create a new Authentication Ruleset.
Specify:
Rule Name
Security Group: The group was created earlier.
Authentication Condition Name
Allowed Authentication Type: User Name Password
Activate all pending authentication policy changes.
Troubleshooting
If authentication issues occur, use the Signons and Attempted Signons report to identify and resolve failed sign-on attempts.