Workday provides on-demand financial management and human capital management (see https://www.workday.com/). You can protect access to Workday by integrating Workday with Identity as a Service. Once integrated, users can use single sign-on to log in to their Workday account through Identity as a Service.
Note: This integration was tested using Identity as a Service version 5.12 and Workday version 2020R2.Other versions of Workday may require integration and configuration steps that differ from those documented in this procedure. For other versions of Workday, this integration guide may be used as an initial approach for integrating Workday. In the event of other issues, contact support@entrust.com for assistance.
To integrate Workday with Identity as a Service, you must do the following:
Copy the SAML Configuration from Identity as a Service
1. Log into your Identity as a Service administrator account.
2. Click
> Security
> Applications. The Applications Lists page appears.
3. Under SAML Cloud Integrations, click SAML Configuration. The SAML Configuration dialog box appears.
This dialog box contains information you need to configure your SAML application for Identity as a Service authentication.
4. Do one of the following:
● Leave this dialog box open to reference later in this procedure.
● Copy the Entity ID, Single Sign-on URL, and Single Logout URL to a text file and save it to reference later in this procedure.
Note: Depending on the integration you are performing, you may not need all three of these SAML configuration values.
Export a SAML signing certificate
1. Log in to your Identity as a Service administrator account.
1. Click
> Security > Applications.
The Applications List page appears.
2. Under SAML Cloud Integrations, click SAML Signing Certificates. The SAML Signing Certificates page appears.
3. Click
next to the certificate to export the certificate
you want to import into your SAML service provider application. The Export Certificate dialog box appears.
a. If the certificate has been issued by a CA, do one of the following:
– Click Certificate to export the self-signed certificate.
– Click Root CA Certificate to export a certificate issued from a CA.
– Click Certificate Chain to export the SAML signing certificate and its CA certificates.
b. Click Export.
1. Log in to your Workday account.
2. In the Workday search bar, enter Edit Tenant Setup Security. The Edit Tenant Setup - Security page appears.
3. Scroll to Single Sign-On.
4. In
the Single Sign-On section, click next
to Login Redirect URL Environment Setting.
5. In the Redirect Type field, select Single URL.
6. In the Login Redirect URL field, enter the Workday SAML login URL.
Example: https://impl.workday.com/mycompany/login-saml2.flex
7. In the Logout Redirect URL, enter the Single Logout URL you copied in Step 1: Copy the SAML configuration from Identity as a Service.
8. In Timeout Redirect URL, enter the Single Logout URL you copied in Step 1: Copy the SAML configuration from Identity as a Service.
9. In Mobile App Login Redirect URL field, enter the Workday SAML login URL.
Example: https://impl.workday.com/mycompany/login-saml2.flex
10. In the Mobile Browser Login Redirect URL field, enter the Workday SAML login URL.
Example: https://impl.workday.com/mycompany/login-saml2.flex
11. For the Environment, select Implementation.
12. Scroll to SAML Setup.
13. Select Enable SAML Authentication.
14. In
the SAML Identity Provider section, click
next to Identity Provider.
15. In the Identity Provider Name field, enter a name for your Identity Provider, for example, Entrust.
16. In the Issuer field, enter the Entity ID you copied in Step 1: Copy the SAML configuration from Identity as a Service.
17. In the x509 Certificate field, select Create x509 Public Key from the drop-down list. The Create x509 Public Key dialog box appears.
18. In the Name field, enter a name for the certificate.
19. Locate the certificate file you downloaded in Step 2: Export the signing certificate and open it in a text editor, such as Notepad.
20. Copy the contents of the certificate and paste it in the Certificate field on the Create x509 Public Key dialog box.
21. Click OK to close the dialog box and return to the Edit Tenant Setup - Security page.
22. Scroll to SAML Setup and go to the SAML Identity Provider section.
23. Select Enable IdP Initiated Logout.
24. In the Logout Response URL field, enter the Single Logout URL you copied in Step 1: Copy the SAML configuration from Identity as a Service.
25. Select Enable Workday Initiated Logout.
26. In the Logout Request URL field, enter the Single Logout URL you copied in Step 1: Copy the SAML configuration from Identity as a Service.
27. Select Use Unspecified Name ID Format for Logout Request.
28. In the Service Provider ID field, enter http://www.workday.com/<tenant_name>.
29. Select Always Require IdP Authentication and then select ForceAuthnOnly.
30. In the IdP SSO Service URL field, enter the Entity ID you copied in Step 1: Copy the SAML configuration from Identity as a Service.
31. From the Used for Environments drop-down list, select Implementation.
32. Go to the x509 Private Key Pair section and select Create x509 Private Key Pair. The Create x509 Public Key dialog box appears.
33. In the Name field, enter the Identity Provider name you entered in Step 6 above.
34. Click OK to close the dialog box and return to the Edit Tenant Setup - Security page.
35. Scroll to Service Provider ID (Will be Deprecated) and enter http://www.workday.com/<tenant_name>
36. Select Always Require IdP Authentication (Will be Deprecated) and then select ForceAuthnOnly.
37. In the IdP SSO Service URL field, enter the Entity ID you copied in Step 1: Copy the SAML configuration from Identity as a Service.
38. Select Always Require IdP Authentication (Will be Deprecated) and then select ForceAuthnOnly.
39. Select SHA256 as the Authentication Signature Request.
40. Click OK. The Security Email Settings appear.
41. Click Done.
Download the Workday metadata file. You use this file when you Add Workday to Identity as a Service.
1. Log in to Workday.
2. In the Search bar enter saml.
3. In the Search Results, click Generate Workday SAML Metadata. The SAML Metadata Descriptor appears.
4. Copy the contents of the SAML Metadata Descriptor and paste it into a text editor such as Notepad.
5. Save the file as SAMLMetadatafile.XML. You need this file for Step 5: Add Workday to Identity as a Service.
Add Workday as an application to Identity as a Service
1. Log in to your Identity as a Service administrator account.
2. Click
> Security > Applications. The Applications
Lists page appears.
3. Click Add. The Select an Application Template page appears.
4. Do one of the following:
● Select SAML Cloud Integrations from the search drop-down list and scroll to find the application you want to add to IDaaS.
- or -
● In the Search bar, enter a search option to filter for the application you want to add to IDaaS.
5. Click Workday. The Add Workday page appears.
6. Enter an Application Name.
7. Enter an Application Description.
8. Optional. Add a custom application logo.
a. Click next to Application Logo. The
Upload Logo dialog box appears.
b. Click to
select an image file to upload.
c. Browse to select your file and click Open. The Upload Logo dialog box reappears showing your selected image.
d. If required, resize your image.
e. Click OK.
9. Select the Authentication Flow that appears to users during login.
10. Click Next. The General page appears.
11. Click
to the Upload Metadata XML
and browse to the location of the metadata file you downloaded
in Step 4 Download the Workday metadata file.
The Metadata Configuration dialog box appears.
a. If required, click Merge with existing values to merge new values with existing values for Alternative Assertion Consumer Services URLs and SAML attribute names.
b. Click Save.
12. Optional. Enter the SAML Username Parameter Name used to identity the user ID being requested for authentication. The user ID can then be passed as a parameter, for example, Username=jdoe. Alternately, if the SAML username is NameID, the SAML Request XML NameID element value is used to the identify the IDaaS userID.
13. Enter the SAML Session Timeout to the time when the SAML Assertion times out. The maximum is 720 minutes.
14. Enter the Max Authentication Age (seconds) to set the maximum amount of time that can elapse before a user is required to reauthenticate during a new login attempt. This applies for both SP-initiated and IDP-initiated login. Set this field to -1 to disable this feature.
15. From the SAML NameID Attribute drop-down list, select User ID.
16. From the SAML Signature Algorithm drop-down list, select SHA256.
17. Select the SAML Signing Certificate from the drop-down list.
18. Deselect Enable Go Back Button if you do not want users to be able to go back to the Workday login page to log in.
19. Select Show Default Assertion Consumer URL Service in the My Profile. When selected, the Default Assertion Consumer URL appears in a user's My Profile page in addition to relay states and Alternative Assertion Consumer URLs.
20. Optional. Add Alternative Assertion Consumer Service URLs, as follows:
a. Click Add.
b. Enter a Name.
c. Enter a URL Value.
d. Select Show in My Profile to display the Alternative Consumer Service URL in a user's My profile page.
e. Optional. Add an Application Logo.
f. Click Add.
g. Repeat these steps to add more Alternative Assertion Consumer Service URLs.
Relay states apply to the Default Assertion Consumer Service URLs and not the Alternative Assertion Consumers URLs.
21. Click Submit.
1. Log in to your Workday account.
2. In the Workday search bar, enter Edit Tenant Setup Security. The Edit Tenant Setup - Security page appears.
3. Scroll to SAML Setup.
4. In the SAML Identity Provider section, select the following:
● SP Initiated
● Sign SP Initiated Request
5. Scroll to select Enable SP Initiated SAML Authentication (Will be Deprecated).
6. Select Sign SP-initiated Authentication (Will be Deprecated).
7. Scroll to Single Sign-on.
8. In
the Redirection URLs section, click
next to Login Redirect URL Environment Setting.
9. Under Redirect Type, click Single URL.
10. In the Login Redirect URL, enter https://impl.workday.com/<identity_provider_name>/login.saml2.flex.
11. In the Logout Redirect URL, enter the Single Logout URL you copied in Step 1: Copy the SAML configuration from Identity as a Service.
12. In the Timeout Redirect URL, enter the Single Logout URL you copied in Step 1: Copy the SAML configuration from Identity as a Service.
13. From the Environment drop-down list, select Implementation.
14. Click OK.
Testing Service Provider Login
1. Open a Web browser and enter the URL for your Workday account. You are directed to Identity as a Service.
2. Enter your Workday account User ID and click Next.
3. Respond to the second-factor authentication challenge. If you respond successfully, you are logged in to Workday.
Testing Identity as a Service redirect log in
1. Log in to your Identity as a Service account.
2. Go to your My Profile page if you are not already there.
3. Under Applications, click Workday.
4. Respond to the second-factor authentication challenge. If you respond successfully, you are logged in to Workday.