Workday - SSO Configuration
This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Workday using Multi-Pass. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
To set up Multi-Pass with Workday, ensure you meet the following requirements:
- Workday admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Workday are registered in your IdP and have the necessary permissions to access Workday.
Important: Custom elements in URLs (like tenant names) are case sensitive. Make sure to match the exact casing from your environment.
Workday - SSO Configuration
Step 1 — Create a Custom SAML Application in Multi-Pass (IdP)
- Select the correct tenant and go to Integrations, click on Applications.
- Select SAML in the custom integration section.
- Complete the form with the following information:
- Select Download under Tenant XML Data and save the file locally.
- Click on the Advanced Console on the right side of the screen.
- Click on Clients and search for Workday.
- Make sure all the fields are populated as shown below:
General settings (Multi-Pass)
Access settings (Multi-Pass)
SAML Capabilities
| Setting | Value |
|---|
| Name ID Format | email |
| Force Name ID Format | ON |
| Force POST Binding | ON |
| Include AuthnStatement | ON |
Signature & Encryption
| Setting | Value |
|---|
| Sign Documents | OFF |
| Sign Assertions | ON |
- Log in to Workday as a Security Admin.
- In the search bar, search for Edit Tenant Setup – Security.
- In the SAML Setup section, select Import Identity Provider.
- Enter
Multi-Pass as the Identity Provider Name. - Select the correct environment.
- Upload the metadata file you downloaded earlier from Multi-Pass.
- Click OK — a new row will be added in the SAML Identity Providers table.
- For the new entry, configure the following:
- Select Enable IDP Initiated Logout checkbox.
- Set Logout Response URL
- Select Enable Workday Initiated Logout checkbox.
- Set Logout Request URL
- Select SP Initiated checkbox.
- Set Service Provider ID
- Select Don’t Deflate SP-initiated Authentication Request.
- Click OK.
Related Articles
D2L Brightspace - SSO Integration
This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
Mulesoft - SSO Integration
This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
SAML SSO Integration Guide
This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
Miro - SSO configuration
This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Miro using MPAS. SSO simplifies user authentication by allowing access to multiple ...
Pipedrive – SSO configuration
This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Pipedrive using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...