Setup- Admin Reference Guide

Business Preferences

Setup > Preferences You can use the Preferences area to set system parameters that affect specific displays and operations in Incent, and to define the business currency, date format, and […]

Configure > Reason Code

Configure > Reason Code Reason codes define codes for specific business reasons. After defining a set of reason codes, administrators and users can then use these codes to document the […]

Roles

Setup > Roles You can use the Roles area to define a set of user privileges in Xactly Incent. Privileges are defined as the ability to access an area of the […]

Customize > Branding

Customize > Branding You can use the Branding area to upload a company logo into Modeling, which then appears in several prominent areas of the end user experience. Screen Branding […]

Translation Workbench

Setup > Translation Workbench You can use the Translation Workbench to import custom translations into Incent. This allows you to support a global sales team with additional languages, for instance, […]

Customize > Branding

Customize > Branding You can use the Branding area to upload a company logo into Incent, which then appears in several prominent areas of the end user experience. Specifically, after […]

Customize > SAML Integration

Customize > SAML Integration You can use the SAML Integration area to customize the SAML integration settings, allowing you to use SAML connections to access Xactly Incent. note: You can […]

Customize > Manage Certificate

Customize > Manage Certificate Many organizations configure single sign-on with Xactly Incent to ensure a consistent user-experience and to ensure their security policies are enforced. When SAML is configured for single […]

Customize > Login Profiles

Customize > Login Profiles You can use the Login Profiles area to create and manage login profiles, which enable administrators to specify the allowed login paths that Incent users can […]

Tokenized Fields

Tokenized Fields You can use the Tokenized Fields area to identify the tokenized fields used within your business (as implemented and managed using suitable third-party security tools). note: Tokenized fields […]