Connectors 2.0is used as one of the main ingestion methods of data from Salesforce to Gainsight and is a native built integration that exists between the two systems. The connector is authenticated using a Gainsight Integration user in our Salesforce Instance. More information in regards to the connector and how to set it up in Gainsights Knowledge Base.
Connectors 2.0is used between our Salesforce instance and Gainsight instance to mainly sync three objects:
Connectors 2.0are very powerful we also have to supllement the data that is brought in through the connector to correctly display it within Gainsight and to coordinate bi-directional data syncs (and more). The below rules that exist in Gainsight are highlighted and shared in a manner that reflects their use in various Rule Chains in Gainsight.
Gainsight NXTpermission set in Salesforce and are also an Active user in Salesforce.
Gainsight => SFDCTab in this Google Doc
Connectors(Admin: This is different from the
Connectors 2.0within Gainsight).
Connectors 2.0. Gainsight then leverages this Organization ID to match Tickets (that are synced over from Zendesk) with Accounts (that are synced over from Salesforce).
Below are the Gainsight bundles (permission sets) and relevant access categories.
|Home||Dashboard view access||✓||✓||✓||✓||✓|
|Timeline||End user account Timeline history view||✓||✓||✓||✓||✓|
|Cockpit||View and execute Calls to Action (CTAs)||✓||✓||✓||✓||✓|
|C360 Account||View and edit customer Account data||✓||✓||✓||✓||✓|
|Surveys||Access to create surveys||✓||✓||✓|
|Admin: Journey Orchestrator||Administrative access to creating and deploying one-to-many email campaigns||✓||✓||✓|
|Admin: Data / Integrations Operations||Administrative access for Gainsight customer data and integrations||✓||✓|
|Admin: Email Configuration||Admin access for backend of email domain, including CNAME setup||✓||✓|
|Admin: Reporting||Admin access to build, share, and modify reports and dashboards||✓||✓|
|Admin: Rules Engine||Admin access to create rules (workflows) to run CTAs and other operations||✓||✓|
|Admin: User Provisioning||Admin access: user provisioning and deprovisioning access||✓|