Platform – Integration

Enterprise workflows require ability to integrate with multiple systems in real-time. Reganto Integration hub provides real time and schedule based point-to-point integrations to systems such as HR, Payroll, Time Capture, Student information systems, etc. With two-way sync of data across channels, the Reganto Platform can work with any system, over any protocol.

How it works

TCP, SMTP, ODBC, HTTPS and SFTP. Reganto can receive data in any protocol and can send data back in any protocol. This unique approach to integration takes the pain away from systems connecting to Reganto thereby eliminating the need for technical help to implement Reganto.

Reganto can accept files or input in any format. With our powerful data mapper with real-time function capability, we can handle any format. This coupled with Reganto’s ability to connect over any protocol ensures smooth, automated data flow between external systems and Reganto.

Reganto can initiate exchanges and can also be triggered. Executions can be time based, trigger based or event based. Being a 100% API driven system, Reganto allows external systems to invoke integration routines through an authenticated API call. As Reganto is built on an event hub architecture, integrations can be tied-up to system events to ensure end-to-end automation. 

SYSTEM HIGHLIGHTS​

Data Exchange In

Real time

API based integrations ensure data can be sent and received in real-time while taking care of data and business validations. Reganto Integration Hub provides data dashboards outlining key statistics like throughput, last run time, error lists, etc.

FAil Proof

Retry based integration

Loss of data connectivity can be easily managed through Reganto Integration Hub with its customisable retry mechanism. With automated time based retries and event based retries, the system ensures that data loss never occurs.

Secure

Authentication driven

Reganto integration hum provides an integrated authentication framework ensures single-sign-on with OAuth support. Key based authentication is also supported.

Transformation

And data mapping

Data from source can either be directly mapped or mapped post transformation through integer and string functions.