Configure SSO from Salesforce to ADP
Let your users log in to ADP using single sign-on (SSO) from your Salesforce org configured as an identity provider.
Required Editions
| Available in: Lightning Experience and Salesforce Classic |
| Available in: Enterprise, Performance, Unlimited, and Developer Editions |
If ADP helps you set up SSO and you create a connected app in Salesforce, users can access ADP using their Salesforce login credentials. Follow these high-level steps to configure SSO for Salesforce to ADP.
Set Up Your Salesforce Org as an Identity Provider
With the My Domain feature, your Salesforce org is enabled as an identity provider. My Domain is required for all orgs, If you don’t like your org’s My Domain name or circumstances warrant a change, you can rename it.
With the My Domain feature, your Salesforce org is enabled as an identity provider. My Domain is required for all orgs. If you don’t like your org’s My Domain name, you can change it.
To download the Salesforce self-signed certificate:
- From Setup, enter Identity Provider in the Quick Find box, and select Identity Provider.
- Click Download Certificate.
Provide SAML Settings to ADP
To enable your Salesforce org to authenticate users to ADP, give this information to your ADP representative.
- Assertion Issuer URL, for example, https://MyDomainName.my.salesforce.com/.
- A signing certificate, such as the identity provider certificate that you downloaded.
Create a Connected App in Salesforce
- In Salesforce, create a connected app.
- In Lightning Experience, from Setup, enter App in the Quick Find box, and select App Manager. Click New Connected App.
- In Salesforce Classic, from Setup, enter Apps in the Quick Find box, and select Apps. Under Connected Apps, click New.
- Configure the connected app Basic Information settings.
- Enter a name for the ADP connected app. Salesforce uses this name to populate the API name.
- Enter your email address in case Salesforce needs to contact you or your support team.
- Optionally, upload or specify a logo and icon to represent your ADP application in the Salesforce App Launcher.
- Configure the connected app Web App Settings.
- Select Enable SAML.
- For Entity Id, enter the URL for your ADP domain, for example, https://fed.adp.com.
- For ACS URL, enter the URL provided by your ADP representative.
- For Subject Type, select Persistent ID or Custom Attribute. The subject type is the method attribute by which a username in ADP maps to a Salesforce user identity. This field can contain a random value.
- For Name ID Format, select urn:oasis:names:tc:SAML:1.1:nameid-format:transient.
- For Issuer, keep the default value, which is your My Domain login URL.
- For IdP Certificate, keep the default (Default IdP Certificate).
- Save the settings.
- Configure a custom attribute for the connected app.
- From Setup, enter Apps in the Quick Find box.
- If you’re using Lightning Experience, select Manage Connected Apps.
- If you’re using Salesforce Classic, under Manage Apps, select Connected Apps.
- Click the name of your connected app for ADP. The connected app detail page appears.
- Under Custom Attributes, click New.
- Enter the attribute key PersonImmutableID with a value of $User.Id.
- Save the settings.
- From Setup, enter Apps in the Quick Find box.
- On the connected app detail page, click Manage Profiles or Manage Permission Sets. Add profiles or permission sets for users who can access this app.
- In Salesforce, enter the start URL for the connected app.
- On the connected app detail page, under SAML Login Information, copy the IdP-initiated login URL.
- On the connected app detail page, click Edit Policies.
- For Start URL, enter the IdP-initiated login URL. Optionally, add RelayState= with the parameter of the ADP service that you’re trying to access.
- Save the settings.
Test the Connected App
- In Salesforce, from the App Launcher, find and open the ADP app. If you configured the ADP logo and icon for the connected app, the App Launcher displays them.
- If SSO is configured properly, Salesforce creates an application session.

