ADP Workforce Now Connection Configuration
Steps
-
In the ACS URL field, enter the assertion consumer service (ACS) URL.
The default ACS URL is pre-populated, and should work for most ADP Workforce Now connections. -
In the Entity ID field, enter the Entity ID.
The default Entity ID is pre-populated, and should work for most ADP Workforce Now connections.
-
In the Target Resource field, enter a URL to redirect the user to after IdP-initiated single sign-on (SSO).
The default URL is pre-populated, and should work for most ADP Workforce Now connections.
-
In the Single Logout Endpoint field, enter a URL for PingOne to send single logout (SLO) requests to.
-
In the Single Logout Response Endpoint field, enter a URL for PingOne to send SLO responses to.
-
On the Primary Verification Certificate line, click Browse to locate and upload a local certificate file used to verify SLO requests and responses.
-
On the Secondary Verification Certificate line, click Browse to locate and upload a local certificate used to verify SLO requests and responses if the primary certificate fails.
-
Select the Force Re-authentication checkbox to require your identity bridge to re-authenticate users with an active SSO session.
-
Select the Encrypt Assertion box to encrypt outgoing SAML assertions.
-
On the Signing line:
Choose from:
-
Click Sign Assertion to have PingOne sign outgoing SAML assertions. This is the default option.
-
Click Sign Response to have PingOne sign responses to incoming SAML assertions.
-
-
From the Signing Algorithm list, select an algorithm with which to sign SAML assertions.
-
Select the Use Custom URLcheckbox to enter a customer URL to launch ADP Workforce Now from the dock.
Next steps
Click Continue to Next Step.