Setup > Preferences You can use the Preferences area to set system parameters that affect specific displays and operations in Incent, and to define the business currency, date format, and […]
Setup- Admin Reference Guide
Configure > Reason Code
Configure > Reason Code Reason codes define codes for specific business reasons. After defining a set of reason codes, administrators and users can then use these codes to document the […]
Roles
Setup > Roles You can use the Roles area to define a set of user privileges in Xactly Incent. Privileges are defined as the ability to access an area of the […]
Customize > Branding
Customize > Branding You can use the Branding area to upload a company logo into Modeling, which then appears in several prominent areas of the end user experience. Screen Branding […]
Translation Workbench
Setup > Translation Workbench You can use the Translation Workbench to import custom translations into Incent. This allows you to support a global sales team with additional languages, for instance, […]
Customize > Branding
Customize > Branding You can use the Branding area to upload a company logo into Incent, which then appears in several prominent areas of the end user experience. Specifically, after […]
Customize > SAML Integration
Customize > SAML Integration You can use the SAML Integration area to customize the SAML integration settings, allowing you to use SAML connections to access Xactly Incent. note: You can […]
Customize > Manage Certificate
Customize > Manage Certificate Many organizations configure single sign-on with Xactly Incent to ensure a consistent user-experience and to ensure their security policies are enforced. When SAML is configured for single […]
Customize > Login Profiles
Customize > Login Profiles You can use the Login Profiles area to create and manage login profiles, which enable administrators to specify the allowed login paths that Incent users can […]
Tokenized Fields
Tokenized Fields You can use the Tokenized Fields area to identify the tokenized fields used within your business (as implemented and managed using suitable third-party security tools). note: Tokenized fields […]