Welcome aboard! Congratulations on becoming a valued Popdock user. This documentation is dedicated to ensuring your success in any future Popdock project.
What you can expect to find
Step One: Create your Popdock Account
To get started, simply click here to set up your account. During the process, you’ll have the option to choose the region where your Popdock is hosted.
Step Two: Add your Connectors
It’s essential to connect your data sources securely, whether you’re linking to cloud-based services (SaaS) or on-premise systems like Dynamics GP, NAV, SL, or Microsoft SQL. For on-premise systems, we highly recommend using our secure on-premise data gateways for added protection.
- If you plan to connect to GP/SL/NAV/SQL on-premise, you will need to utilize the data gateway.
- If you are connecting to Business Central on-premise, you will need to reach out to our support team. This process varies by customer and is best achieved with the help of one of our representatives.
- If you have multiple on-premise data sources, you will need multiple gateway installations.
Verify your Data
Once a connector is added, it’s important that you verify its functionality. The process for doing this may vary depending on the specific connector you are using.
If you’re utilizing one of our connectors with pre-configured lists, you can start by selecting any list and checking if the data retrieved matches your source.
However, if you’re using one of our connectors without a pre-defined list or utilizing the REST API connector, you’ll need to add a list and confirm that it successfully retrieves the necessary data. You also have the ability to build custom lists to see the specific data you need. This article can be a good starting point for that.
Step Three: Configure Your Popdock Users & Security Access
To manage user access and maintain data security, check out our comprehensive guide on user management and security here.
This is where many of the best practices come into play when managing your Popdock environment. As a Popdock administrator, you’ll find that you spend most of your time on security access management and user groups. One common question we encounter is, “How do you control who sees what?”
In Popdock, there are two types of users: named users and widget users. Let’s break down what each type means for you:
- These users log into the Popdock web app and can be granted various permissions, from viewing specific lists to creating custom connectors and lists.
- These users have the flexibility to work with multiple lists simultaneously, and these lists are persistent from one session to the next.
- They also have access to the Popdock dashboard, where they can create custom reports and graphs on the landing page.
- These users consume data from Popdock embedded within another application, such as ERP data embedded in CRM.
- These users’ access is limited to the data that the administrator(s) grant them security access to.
- They do not need to be added as a named user in Popdock.
Now, let’s talk about the best practices and tips for handling named users:
- Create Teams: Start by creating teams for users who require the same permissions, such as a sales team needing access to unpaid invoices from ERP.
- Grant Security Access: Assign connector and list security access to these teams based on their specific needs.
- Roles Configuration: Review the out-of-the-box roles provided by Popdock to see if they meet your organization’s needs. If not, you can create custom roles.
- Configure Security Measures: Set up Multi-Factor Authentication (MFA) and password policies to enhance security.
When adding users, follow these guidelines:
- Bulk Addition: You can add users in bulk by entering multiple email addresses in the “Add Users” dialogue.
- Invitations: New users will receive an email invitation containing a link. They must use this link to complete their account setup within 24 hours. If they don’t, you’ll need to resend the invitation.
- User Notification: Before adding users, notify them that they will receive an invitation to Popdock, and explain that the link in the invitation expires.
- Timing: Add users at a time that allows them the most convenient opportunity to take action. For instance, it’s often best to avoid adding users on Friday afternoons.
Something about widget users?
For more information on managing user access and maintain data security, check out our comprehensive article on user management and security here.
This information will allow you to get the right people connected to your data. Next, we highly recommend exploring the how-to’s by solution type:
- Virtual Integration
- Self-service reporting
- Cross-App (and cross-table) reporting with Custom Lists
- Data Lake Management
- Data Migration
All Popdock users will be automatically added to the self-paced training at eOne University. A Popdock user account is required to obtain access to the self-paced training.