Single Sign-On for Workday OfficeConnect with Microsoft Entra ID
Workday OfficeConnect doesn’t authenticate to Microsoft Entra ID directly. OfficeConnect authenticates to Workday, and Workday uses Entra ID as its identity provider. The configuration sits on the Workday side, with Entra ID providing the SAML or OIDC backbone.
This guide assumes Entra ID-to-Workday SSO is already working for the Workday web app. If not, do that integration first (Entra’s enterprise app gallery has a “Workday” SAML template).
For generic SSO concepts, see Set Up Workday SSO.
Step 1 — Verify OfficeConnect is enabled and the API client exists
Step 2 — Configure (or verify) Workday in the Entra ID enterprise app gallery
Choose SAML as the SSO method. Fill in:
- Identifier (Entity ID): your Workday tenant URL (e.g.,
https://impl.workday.com/example) - Reply URL: Workday’s ACS URL — the exact value comes from your Workday SSO configuration page
- Sign on URL: the Workday tenant URL users should land at after SSO
- Relay State: leave default unless your Workday admin says otherwise
user.userprincipalname) is correct for most setups where Workday usernames match Entra UPNs. If your organization uses email or a custom attribute, adjust here.Step 3 — Configure Workday’s SSO settings
/saml2).Step 4 — Assign users in Entra
Step 5 — Conditional Access considerations
Most organizations apply Entra Conditional Access policies that require MFA or compliant devices for SaaS apps.
Step 6 — Test from Excel
Common failure modes
| Symptom | Likely cause | Fix |
|---|---|---|
| Entra sign-in succeeds, then OfficeConnect shows “Cannot connect” | Missing Access OfficeConnect permission in Workday | Add the permission to the user’s permission set |
| Sign-in loop bounces back to Entra | Browser blocking third-party cookies | Allow cookies for myworkday.com and login.microsoftonline.com |
| MFA prompt never returns | Authenticator app push timing out, or device not registered | Verify Microsoft Authenticator on the user’s phone is registered for Entra MFA |
| Conditional Access blocks OfficeConnect | Device compliance or location policy excludes the path | Adjust the policy or create an exception for OfficeConnect’s sign-in URL |
| “Worked yesterday, broken today” | Entra certificate rotation that wasn’t synced to Workday | Re-upload the current Entra certificate in Workday |
| Some users get in, others don’t | Group assignment in Entra missing the affected users | Verify Users and groups in the Workday enterprise app |
Result
Workday OfficeConnect users sign in with their Entra credentials, MFA and Conditional Access policies flow correctly, and no Adaptive Planning password is required.
Next steps
- Set Up Workday SSO — generic SSO concepts.
- SSO with Okta — the Okta equivalent.
- Authentication Token Errors — when sign-in succeeds but tokens later fail.