This article explains how to configure ADP integration with ManageEngine ADManager Plus to enable seamless Active Directory integration and automate HR system integration using API-based workflows. By connecting ADP with ADManager Plus, IT administrators can standardize and automate your user provisioning processes, ensuring efficient and secure identity life cycle management.
With this HCM integration, employee data such as new hires, job role changes, or personal information updates from ADP can be automatically synchronized with systems like Active Directory, Microsoft 365, Exchange, and other enterprise applications. This payroll integration helps bridge the gap between HR and IT, enabling faster onboarding, consistent data updates, and streamlined offboarding processes.
Key benefits include:
HR-driven IT provisioning: Automate user provisioning, updates, and deprovisioning directly from ADP to AD and associated systems, reducing manual effort and improving accuracy.
Workflow-controlled automation: Use multi-level approval workflows to monitor and control automated user management tasks.
Policy-driven automation: Create task-specific policies and prioritize them for execution, ensuring actions follow a predefined and compliant process.
ADP integration requires Client Id and Client Secret for authorization.
To import users (inbound action), ensure the account used for authorization has permission to read all user accounts.
To perform any action or query in ADP (outbound action), ensure the account used for authorization has permission to perform the desired action.
Log in to ADManager Plus and navigate to Directory/Application Settings.
Go to Application Integrations, then search and select ADP Workforce Now.
Toggle the Enable ADP Workforce Now Integration button on.
On the ADP Workforce Now Configuration page, click Authorization.
In the Grant Type dropdown, select Client Credentials.
Perform the steps to generate a Client Id and Client Secret from ADP and paste them in the respective value fields.
In Advanced Options, upload the certificate and key file generated in the ADP side in the respective fields and provide the Passphrase if the certificate is password protected.
Click Configure.
An inbound webhook enables you to fetch user data from ADP to ADManager Plus. The attribute mapping configured in this section can be selected as the data source during automation configuration to perform the desired action on the list of users received from the API response. To configure an inbound webhook for ADP:
Under Inbound Webhook, click ADP Workforce Now Endpoint Configuration.
In the Endpoint Configuration tab, an endpoint, ADP USERS ENDPOINT, comes preconfigured with an endpoint URL, API method, Headers, and Parameters fields to fetch user accounts from ADP. However, if you would like to use a new endpoint to import users, you can configure one using the + Add API endpoint button and filling in the required fields as per ADP Workforce's API references. Click here to learn how.
The API key value pair is preconfigured as a header for authenticating API requests during the Authorization configuration process.
You can add macros to your endpoint configuration to dynamically change it as per your requirement using the macro chooser component.
Refer to ADP Workforce's API references and configure additional Headers and Parameters, if required.
Once done, click Test & Save. A response window will display all the requested parameters that can be fetched using the API call. Click Proceed.
Refer to ADP Workforce's API references to learn which Parameters must be configured to fetch only specific parameters.
You can configure multiple endpoints for ADP Workforce using the + Add API endpoint button. Click here to learn how.
Click Data Source - LDAP Attribute Mapping to match endpoints and to map AD LDAP attributes with the respective attributes in ADP Workforce.
Click + Add New Configuration and perform the following:
Enter the Configuration Name and Description and select the Automation Category from the drop-down menu.
In the Select Endpoint field, select the desired endpoint and a Primary Key that is unique to a user (for example, employeeIdentifier).
In the Attribute Mapping field, select the attribute from the LDAP Attribute Name drop-down menu and map it with the respective column in ADP.
If you would like to create a new custom format for this, click Add New Format.
Click Save.
Configure an automation with the required action, repeat frequency, and the attribute mapping configuration described above.
Outbound webhook enables you to update the changes made in AD using ADManager Plus to ADP and synchronize them with AD. To configure an outbound webhook for ADP:
Under Outbound Webhook, click ADP Workforce Now Webhook Configuration.
Click + Add Webhook.
Enter a name and description for this webhook.
Decide on the action that has to be performed and refer to ADP's API documentation for the API details, such as URL, Headers, and Parameters.
Select the HTTP method that will enable you to perform the desired action on the endpoint from the drop-down menu.
Enter the endpoint URL.
Configure the Headers, Parameters, and Message Type in the appropriate format based on the API call that you would like to perform.
Click Test and Save.
A pop-up window will then display a list of AD users and groups to test the configured API call. Select the desired user or group for which this API request has to be tested and click OK. This will make a real-time call to the endpoint URL, and the selected objects will be modified as per the configuration.
The webhook response and request details will then be displayed. Verify them for the expected API behavior and click Save.
The configured webhooks can be integrated into Orchestration Templates—enabling scheduled or Event-driven Automation—to consecutively perform the action configured in the outbound webhook among the actions on a group of users or on individual users.
Schedule user import and update automations during non-business hours to reduce the load on both AD and ADP systems.
Keep track of your ADP API token expiry and refresh authentication credentials proactively to avoid integration failure.
Map only essential fields from ADP to AD (like department, title, or email) to keep directory data clean and relevant.