Updates your Applaud tenant with any changed settings on this page. Remember to select this after you change anything on this page. Otherwise, your changes won't be saved and implemented.
Your tenant
Name
The name of the current tenant that you are accessing. This is read-only.
Tier
This is the tier level of your tenant, for example:
Tier 1 - Basic
Tier 2 - Professional
Tier 3 - Enterprise
These tiers indicate the number of users you can have.
User licensing
How many users you have compared to how many licenses are paid for.
Sites
A list of the external sites that have the authority to access your tenant's services. Contact your Applaud support adviser to request any changes to these.
Title*
The custom name you give to quickly identify an external site you have authorized to access your tenant's services.
Site*
The external site's domain. You can use wildcards, for example, *.mydomain.com.
Removes the row from the list.
Adds another row to the form, so you can type the Title andSite domain of the external site that you want to access your Applaud tenant.
Custom Domain
Here you can map your own domain names to your Applaud tenant. For example, you could use applaud.mycompany.com instead of mycompany-com.applaudhcm.com. We set up the SSL (HTTPS) for you to be sure the site is secure.
Warning
Before you set this, you need to work with your network administrators to change your domain's DNS records.
This requires a CNAME record from your custom domain to mycompany-com.applaudhcm.com.
Changes to DNS records can take up to 48 hours to propagate fully.
After you've updated your DNS records, you can add your Custom Domain.
Custom Domain
The domain name that you want to use instead of the default domain name.
Override default pages
Authenticated users home
The page that your users see after they sign in to your Applaud tenant. The Dashboard page is the default, but you can select any page you create.
Anonymous home page
The page that you users who haven't signed in see. This may or may not have a login block on it. You can show anonymous pages to users outside of your organization, for example, to advertise open job postings.
Sign in page
Only shows pages that have a Login form content block. The sign-in block that you use to sign in to your Applaud tenant. You can design your own block to replace the default block.
Page not found (404)
The page users see when there is a 404 Error: Page not found. You could create a page that contains information on who to contact when they receive this error.
Google Maps API Key
Google Map Key
The key used by your Applaud tenant to use Google maps.
Tracking
Google Analytics Tracking Code or Measurement ID
The tracking code provided by Google Analytics for your property.
Do not send Google Analytics tracking data to Applaud
It prevents Applaud from collecting Applaud Google Analytics data. You might want to select this to protect your employee's personal data. However, no personally identifiable information is sent. Applaud has its own Google Analytics and Tag Manager codes, which it uses to collect data to help improve its services, including user navigation activity, such as session duration, pages per session, bounce rate, and information on the traffic's source. But, again, no personally identifiable information is sent.
When you select this option but enter your own codes, Applaud no longer collects data but allows Google to collect data for your own Google Analytics account.
Google tag manager codes - Title
The title of your Google tag code.
Removes a row.
Adds a new row.
Link to other sites
A list of the sites tracked by the tracking codes.
Key file
The Google API Console Service account API key file. When updated, the key file name changed to Keyfile.json automatically.
Property id
The ID of the property you've created in Google Analytics.
Sign in
Indicates how you want your Applaud tenant users to sign into your tenant.
Applaud Cloud
Sign in with credentials specific to Applaud, namely their email address and a password.
Google
Sign in with their Google account sign in. Users can access your Applaud tenant after they sign into their Google account.
SAML
Security Assertion Markup Languages is a standard for exchanging authentication data between applications. Use SAML 2.0 to set up the single sign-on with your own identity provider.
JWT
JSON Web Token is a single sign-on standard for exchanging authentication between applications. Use JWT to set up the single sign-on with your own identity provider.
Google
Client ID
The Client ID from your Client ID for Web application page in your Google APIs for Applaud cloud. See Google's help topic, Get your Google API client ID.
Client secret
The Client secret from your Client ID for Web application page in your Google APIs for Applaud cloud. See Google's help topic, Get your Google API client ID.
SAML
SAML SSO URL
To use SAML, you must provide this link. This is the SAML Single Sign-On URL address that takes you to your IDP.
Public Certificate
Signing, encrypting, and decrypting the request and response are the available options.
This is for validating the incoming SAML responses' signatures and is the identity provider's public PEM-encoded X.509 certificate. We accept .cert files.
This property can be used to validate the signatures of the incoming SAML Responses, this is Identity Provider's public PEM-encoded X.509 certificate. If we configure, this property certificate must be a valid one if in case we give the wrong certificate passport will throw an error while validating the signature.
Private Certificate
This is for signing the request. We accept .pem files.
Authentication requests sent by Passport-SAML can be signed using RSA-SHA1. to sign requests we send, we can use this property.
Private key
You only need to provide the website address for your Identity Provider (IDP). If you want, you can use the certificates to provide added security. They are not required to set up SAML in Applaud. However, if you configure your IDP to send only encrypted responses, you must provide a decryption private key.
This is the private key Applaud uses to decrypt the response given by the identity provider if the response given by IDP is encrypted. We accept .pem files.
JWT
Remote login URL
This is the URL that Applaud will redirect your users to for remote authentication, for example, https://www.yourcompany.com/services/login.
JWT Strategy
Select how you want to authenticate with JWT:
Shared secret
Public key cert
Shared secret
This field is shown if you selected the Shared secret option from the JWT Strategy options. If you activate remote authentication, copy this token first, as it will not be displayed in full again. You will be able to reset it at a later time.
Public Key
This is shown if you selected the Public key cert option from the JWT Strategy options. This is for securing the JWT response. We accept .pem files.
JWT algorithm
This is shown if you selected the Public key cert option from the JWT Strategy options. This algorithm is used when sending the JWT response.
Two-factor authentication
Required for all users
Turns on two-factor authentication for all your tenant users. The next time you sign in, you need to provide your smartphone number. Once you type your number, Applaud sends you a text message with a code you need to type in. You are then shown a One-time backup code that you need to keep a record of. In case you lose your smartphone.
Note
If you use a UK mobile number, don't include the first zero. For example, you would type in 7788994455.
With this turned on, each time you and your users sign in to your applaud tenant, you are sent a text message with a code and are asked to provide the code.
Digital experience survey
Disable default Applaud pulse survey
Turns off a feedback widget that appears on the bottom right of the screen for your Applaud tenant users. The widget appears five minutes after the user has signed in and asks them to rate the app out of five stars. It rechecks every 180 days.
Languages
Installed languages
These are the languages that your tenant admin has added to your tenant. These languages show on the language list you can choose for a user on their preferences tab under the Users menu.
Images
Prevent users from editing their profile photo
Prevents your users from editing their profile photos. However, users with either Identity Manager or Tenant Admin can and can upload profile photos from any integrated third-party system.