Connect Your World

We make the dream of a connected infrastructure into a reality. Browse our library of connectors below and see what we have to offer you. See what HelloID can do for you

Connectors

Aeries | Student Information System | Logo
Logo for AFAS software
Logo for Blackboard
Logo for bmc
Logo for CatalystOne
Logo for cegid
Logo for Ciril | Editeur de Solutions
Logo for Cisco
Dedalus | Healthcare Systems Group | Logo
Logo for Dropbox
Logo for easyVISTA
Logo for Exchange
Logo for Foederis
FreshService| Logo
Icon for CSV
GFI | New Challenges, New Ideas | Logo
Logo for GLPI
Logo for HR Access
Logo for IBM AS/400
IBM | RACF | Logo
Logo for Iprova
Logo for Jira
Logo for KRONOS
Icon for LDAP
Logo for Lucca
Logo for Microsoft Dynamics 365
Microsoft Teams | Video Conferencing, Meetings, Calling | Logo
Logo for MySQL
Icon for NTFS
Logo for Office 365
ONEROSTER 1.1 | Logo
Logo for Progress OpenEdge
Logo for ORACLE
Logo for ORACLE Peoplesoft
Logo for PlanCare
Logo for PostgreSQL
Logo for Power School
Logo for PowerShell
Logo for ProActive
Logo for Pytheas | Software and Services
Logo for Sage
Sales Force | Logo on transparent background
SAP | SAP SuccessFactors | Logo
Logo for sdworx
ServiceNow | Logo on transparent background
SharePoint | Logo on transparent background
Logo for Skype for Business
Logo for Skyward
Logo for Microsoft SQL Server
Logo for Parnas Sys
Logo for Ultimo
Logo for VISMA
Logo for Cisco Webex
workday | Logo
Ypareo | Logo on transparent background
Logo for Zendesk
Logo for Zimbra | A Synacor Product
Zoho | Logo on transparent background

** Important Note: Not all connectors are compatible with all Tools4ever products. Contact our sales team to learn more about our connectors.

HelloID Connectors

  • How does HelloID work? What do connectors do?

    Gaining a basic understanding of attributes, business rules, entitlements, source systems, and targets will provide you with a solid framework for understanding HelloID, its operations, and why connectors are so valuable.

    Attributes, Business Rules, & Entitlements

    In order to drive identity management and provisioning automations throughout your IT environment, HelloID relies upon user attributes, business rules, and entitlements. Attributes include all the of various pieces of identity data that make up a person within HelloID (e.g., name, title, department, manager).

    A user’s attributes determine the business rules that apply to them (e.g., all users receive an Active Directory account). Some business rule configurations are fairly common across all organizations and others may be customized to yours. The applicable business rules determine the entitlements users receive, such as accounts in various systems and permissions in the file system.

    Source & Target Systems

    HelloID connects to the systems and applications within your environment to execute identity management automations and other processes. “Source systems” are those configured to provide HelloID with the user attributes needed to execute various tasks. HelloID detects and syncs all changes in the “source system”, whether newly added users or updates to existing ones. HR and SIS systems most commonly serve as an organization’s “source system” and because HelloID’s data will always mirror them, they may also be called your “source of truth”.

    All other systems and applications that HelloID connects to are “targets”. HelloID executes identity management processes, such as creating and provisioning accounts, in target systems and applications.

  • How do HelloID connectors automate onboarding and provisioning?

    HelloID leverages connectors to create and set up new users’ accounts, group memberships, and assigned permissions. When new users are detected within the configured “source system”, HelloID automatically syncs their data and attributes. The user is created as a “person” in HelloID.

    Based on your organizations configurations, HelloID then automatically provisions each provisions each “person” accordingly. Accounts are created, group memberships are added, and various permissions are assigned accordingly. With automated account creation, provisioning, and access management wrapped into one, new users hit the ground running on their first day.

    HelloID’s automated identity management processes virtually eliminate time-consuming manual efforts, reclaim significant IT staff bandwidth, ensure consistency, and track all actions for easily compiled audit logs.

  • How do HelloID connectors facilitate "self-service"?

    By using group memberships, HelloID’s Service Automation module facilitates complete self-service for users. Outside of automated role-based provisioning, self-service is used to provision specialty access cases and temporary projects.

    HelloID configurations assign the “Product Owners” who approve or deny users’ access requests for a given resource. Users who need to access a given resource may submit requests from the Service Automation tab located on their HelloID dashboard menu. When access requests are approved, HelloID automatically processes the group membership changes to provision the new access, which may also include a revocation date.

  • How does HelloID account for updates to users or connected resources?

    Automatically Update Roles & Access

    HelloID automatically detects user attribute updates in source systems in the same manner as detecting new users. When changes occur, HelloID with sync and process them accordingly to ensure that user data and access remain up-to-date. Throughout promotions, role changes, and any other events that occur during the course of a user’s account lifecycle, HelloID has you covered.

    Provisioning New Resources for Existing Users

    Sometimes your organization will implement a new system, application, or cloud platform that your employees will need access to once it’s rolled out. HelloID provides simplified configuration to assign which groups require access to the new resource, with membership determined by the synced attributes from AD. If the new resource is connected to HelloID and configured, then the specified provisioning processes will be executed as with any other resource.

  • How does HelloID deactivate and offboard users via connectors?

    As part of processing user account changes, HelloID swiftly deactivates and offboards departing employees once their status changes in the integrated source system. When a user’s attributes indicate that a their employment is over, HelloID automatically deactivates accounts, removes group memberships, and revokes access to connected systems and applications. This minimizes offboarding delays, orphan accounts, overlooked access rights, and unnecessary license expenditures.