Ir al contenido principal

HaloPSA Integración

Actualizado hoy

Introducción

This integration syncs Level devices into HaloPSA as assets and routes Level alerts to HaloPSA tickets. Setup happens in three stages: configure a HaloPSA application, connect it in Level, then map your device groups to HaloPSA sites and choose which monitor policies create tickets.


⚙️ PREREQUISITES

  • Level administrator access

  • HaloPSA administrator access with permission to create applications and manage agents


HaloPSA Integración

Configurar HaloPSA Application

HaloPSA uses "Aplicaciones" to allow API access. We need to create one for Level.

1. Go to Configuración > Integracións:

2. Haga clic en "HaloPSA API":

3. Take note of the base URL shown below. This will be used as the "HaloPSA URL" when configuring Level:

4. Haga clic en "Ver Aplicaciones":

5. This is a list of your existing "Aplicaciones". Haga clic en "New" in the top-right corner to create an application for Level:

6. Complete the required "Application Nombre" field with a name of your choice. Seleccione the "Client ID and Secret (Services)" option:

7. Make note of the "Client ID" and "Client Secret" as we will need those when configuring Level.

8. Elegir "Agent" for the "Login Escriba" and select the agent you wish for Level to use.

💡 CONSEJO: HaloPSA recommends creating an "API only" agent for integrations. This type of agent doesn't count against your license seats.

9. Haga clic en "Guardar":

10. Haga clic en "Permisos":

11. Seleccione the following permissions:

  • read:tickets

  • edit:tickets

  • read:customers

  • read:assets

  • edit:assets

ℹ️ NOTE: Halo recently made a change that prevents non-admin integrations from adding fields to asset types. They are working on reverting the change, but it will take approximately two weeks (around November 19th). In the meantime, if you're setting your Halo integration up for the first time, please grant "admin" permission to the application and the agent. Sorry for the trouble.

12. Haga clic en "Guardar" when finished:

Configurar HaloPSA agent permissions

The API agent that you set in the previous step for the "Agent to log in as" requires a couple of permissions to work properly.

1. Go to Configuración > Teams & Agents > Agents and choose the agent assigned to the application:

2. Haga clic en on the "Permisos" tab and enter "Editar" mode:

3. Make sure the following settings are set:

  • Tickets Access Level - Read and Modify

  • Clients Access Level - Read Only

  • Assets Access Level - Read and Modify

  • Can add new Tickets - Sí

  • Allow use of all Ticket Escribas - Sí

4. Haga clic en "Guardar" when finished:

Configurar integration in Level

1. Go to Configuración > Integracións:

2. Haga clic en on HaloPSA integration:

3. Complete the three configuration fields:

HaloPSA URL
The URL you use to access your HaloPSA instance. This URL can point to an on-premises or cloud location and should include the appropriate protocol. For example: https://domainhalopsa.com.

Client ID
The value we generated in the previous steps.

Client secret
The value we generated in the previous steps.

4. Haga clic en el "Guardar changes" button:

5. Press "Test connection" to make sure your settings are working:

Map Level groups to HaloPSA sites

Level will create assets in HaloPSA based on your group mappings. You can choose any group or subgroup in Level and match it with a company and site combo from HaloPSA.

1. Go to "Grupo mapping":

2. Haga clic en "Añadir new groups" to select the Level groups to map to HaloPSA sites:

3. Elegir one or more groups and click "Añadir new groups":

4. Elegir a HaloPSA company for the first mapping:

5. Seleccione the HaloPSA site:

6. Repeat for every row and click "Guardar" when finished:

ℹ️ NOTA: The integration remains disabled at this stage, so no devices are synced yet.

Map Level monitor policies to HaloPSA ticket types

Level can map alerts to HaloPSA tickets. We just need to select which monitor policies should create tickets, as well as which ticket types they should be created as.

1. Haga clic en on "Ticketing":

2. Elegir HaloPSA ticket types for each policy that you wish to map:

3. When finished, click "Guardar changes" at the bottom of the page:

ℹ️ NOTA: The integration remains disabled at this stage, so no devices are synced yet.

Start sending devices and alerts

1. Haga clic en el "Deshabilitard" toggle:

2. This will immediately begin sending devices and alerts. You can see the group mappings change from "Unsynced" to "Syncing" and eventually to "Synced":

3. If you want to follow the progress, or troubleshoot an issue, navigate to the "Events" tab to see a real-time list of requests being sent to HaloPSA:


Preguntas frecuentes

  • Who can configure this integration? A Level administrator. The HaloPSA side also requires an administrator with permission to create applications and manage agents.

  • Do I need to create a dedicated HaloPSA agent for this? HaloPSA recommends it. An "API only" agent doesn't consume a license seat and keeps integration activity separate from human agent activity.

  • Will all devices sync immediately when I enable the integration? Sí. Enabling the toggle starts syncing all devices in mapped groups. Watch the group mapping table — rows move from Unsynced to Synced as devices are processed.

  • Why isn't a device showing up in HaloPSA? Check that the device's group is mapped under Grupo mapping and that the integration is enabled. Then open the Events tab and look for failed requests related to that device.

  • Can I map more groups after the integration is live? Sí. Go back to Grupo mapping, add new groups, and save. New groups sync after the mapping is saved.

¿Ha quedado contestada tu pregunta?