You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/workday-inbound-tutorial.md
+12-8Lines changed: 12 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.date: 06/18/2018
17
17
ms.author: asmalser
18
18
19
19
---
20
-
# Tutorial: Configure Workday for automatic user provisioning
20
+
# Tutorial: Configure Workday for automatic user provisioning (preview)
21
21
22
22
The objective of this tutorial is to show you the steps you need to perform to import people from Workday into both Active Directory and Azure Active Directory, with optional writeback of some attributes to Workday.
23
23
@@ -27,9 +27,9 @@ The [Azure Active Directory user provisioning service](../active-directory-saas-
27
27
28
28
***Provisioning users to Active Directory** - Synchronize selected sets of users from Workday into one or more Active Directory forests.
29
29
30
-
***Provisioning cloud-only users to Azure Active Directory** - Hybrid users who exist in both Active Directory and Azure Active Directory can be provisioned into the latter using [AAD Connect](../connect/active-directory-aadconnect.md). However, users that are cloud-only can be provisioned directly from Workday to Azure Active Directory using the Azure AD user provisioning service.
30
+
***Provisioning cloud-only users to Azure Active Directory** - In scenarios where on-premises Active Directory is not used, users can be provisioned directly from Workday to Azure Active Directory using the Azure AD user provisioning service.
31
31
32
-
***Writeback of email addresses to Workday** - the Azure AD user provisioning service can write selected Azure AD user attributes back to Workday, such as the email address.
32
+
***Writeback of email addresses to Workday** - The Azure AD user provisioning service can write the email addresses of Azure AD users back to Workday.
33
33
34
34
### What human resources scenarios does it cover?
35
35
@@ -282,7 +282,7 @@ Before configuring user provisioning to an Active Directory forest, consider the
282
282
283
283
***Tenant URL –** Enter the URL to the Workday web services
where contoso4 is replaced with your correct tenant name and
593
593
wd3-impl is replaced with the correct environment string. If this URL is not known, please work with your Workday integration partner or support representative to determine the correct URL to use.
594
594
@@ -730,7 +730,7 @@ Follow these instructions to configure writeback of user email addresses from Az
730
730
731
731
***Tenant URL –** Enter the URL to the Workday web services
where contoso4 is replaced with your correct tenant name and
735
735
wd3-impl is replaced with the correct environment string (if
736
736
necessary).
@@ -754,8 +754,7 @@ Active Directory.
754
754
users in Azure Active Directory should have their email addresses written back to Workday. The default scope is “all
755
755
users in Azure AD”.
756
756
757
-
3. In the **Attribute mappings** section, you can define how individual
758
-
Workday attributes map to Active Directory attributes. There is a mapping for the email address by default. However, the matching ID must be updated to match users in Azure AD with their corresponding entries in Workday. A popular matching method is to synchronize the Workday worker ID or employee ID to extensionAttribute1-15 in Azure AD, and then use this attribute in Azure AD to match users back in Workday.
757
+
3. In the **Attribute mappings** section, update the matching ID to indicate the attribute in Azure Active Directory where the Workday worker ID or employee ID is stored. A popular matching method is to synchronize the Workday worker ID or employee ID to extensionAttribute1-15 in Azure AD, and then use this attribute in Azure AD to match users back in Workday.
759
758
760
759
4. To save your mappings, click **Save** at the top of the Attribute-Mapping section.
761
760
@@ -898,6 +897,10 @@ To do this, you must use [Workday Studio](https://community.workday.com/studio-d
898
897
899
898
* When running the **Add-ADSyncAgentAzureActiveDirectoryConfiguration** Powershell command, there is presently a known issue with global administrator credentials not working if they use a custom domain (example: [email protected]). As a workaround, create and use a global administrator account in Azure AD with an onmicrosoft.com domain (example: [email protected]).
900
899
900
+
* Writing data to the thumbnailPhoto user attribute in on-premises Active Directory is not currently supported.
901
+
902
+
* The "Workday to Azure AD" connector is not currently supported on Azure AD tenants where AAD Connect is enabled.
903
+
901
904
* A previous issue with audit logs not appearing in Azure AD tenants located in the European Union has been resolved. However, additional agent configuration is required for Azure AD tenants in the EU. For details, see [Part 3: Configure the on-premises synchronization agent](#Part 3: Configure the on-premises synchronization agent)
902
905
903
906
## Managing personal data
@@ -909,3 +912,4 @@ The Workday provisioning solution for Active Directory requires a synchronizatio
909
912
*[Learn how to review logs and get reports on provisioning activity](../active-directory-saas-provisioning-reporting.md)
910
913
*[Learn how to configure single sign-on between Workday and Azure Active Directory](workday-tutorial.md)
911
914
*[Learn how to integrate other SaaS applications with Azure Active Directory](tutorial-list.md)
0 commit comments