Stitchflow
Ceridian Dayforce logo

Ceridian Dayforce User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 4, 2026

Summary and recommendation

Ceridian Dayforce user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Ceridian Dayforce is an enterprise HCM platform covering payroll, workforce management, HR, and benefits in a single tenant. User access is governed by Security Roles-named collections of feature-level entitlements scoped by org unit, pay group, or employment type.

Every app in your stack that relies on Dayforce employee data inherits whatever access state exists in Dayforce, making role hygiene and timely deactivation operationally critical.

Dayforce does not support SCIM provisioning natively. All user lifecycle actions-onboarding, role changes, and offboarding-must be executed manually through the admin console at Main Menu > System Admin > Security > Users, or through the HR termination workflow. SSO (SAML/OIDC) is supported but requires Enterprise tier and carries its own configuration complexity.

Quick facts

Admin console pathMain Menu > System Admin > Security > Users (and Security Roles)
Admin console URLOfficial docs
SCIM availableNo
SCIM tier requiredEnterprise
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
System Administrator Full access to all Dayforce modules including system configuration, security role management, user creation/deactivation, integration setup, and reporting. Cannot bypass audit logging; certain payroll finalization actions may require additional role entitlements. All plans (role must be explicitly assigned) Included in per-employee-per-month pricing; no separate seat cost documented publicly. System Admin role grants broad access; Dayforce recommends limiting assignment and using more granular roles for day-to-day administration.
Manager / Supervisor Access to direct-report employee records, scheduling, time approval, and performance management within their defined org hierarchy. Cannot access employees outside their assigned org unit; cannot modify system-level security settings. Included in standard Dayforce HCM licensing Included in PEPM pricing Access scope is controlled by the org hierarchy and role entitlements; misconfigured org trees can inadvertently expose or restrict records.
Employee (Self-Service) Access to personal profile, pay stubs, benefits enrollment, time-off requests, and onboarding tasks via the employee self-service portal. Cannot view other employees' data; cannot modify system configuration or approve workflows unless explicitly granted. Included in standard Dayforce HCM licensing Included in PEPM pricing Employee self-service features vary by which Dayforce modules the organization has licensed (e.g., Benefits, Payroll, WFM).
HR Administrator Access to employee lifecycle management, onboarding, offboarding, compensation, and HR reporting across the organization. Cannot modify security roles or system-level configurations unless also granted System Admin entitlements. Included in standard Dayforce HCM licensing Included in PEPM pricing Role entitlements within HR Admin are highly configurable; out-of-box role may need customization to match organizational needs.

Permission model

  • Model type: role-based
  • Description: Dayforce uses a role-based access control (RBAC) model called Security Roles. Each Security Role is a named collection of feature-level entitlements (read, write, execute) across Dayforce modules. Users are assigned one or more Security Roles. Roles can be scoped by org unit, pay group, or other dimensions to restrict data visibility. Administrators can create custom Security Roles by selecting specific entitlements from a granular list of features within each module.
  • Custom roles: Yes
  • Custom roles plan: Available on all Dayforce HCM plans; configuration is done by the customer's system administrator or Dayforce implementation consultant.
  • Granularity: Feature-level entitlements within each module (e.g., view payroll, edit schedules, approve time-off). Entitlements can be further scoped by organizational hierarchy, pay group, and employment type.

How to add users

  1. Navigate to Main Menu > System Admin > Security > Users.
  2. Click 'Add' to create a new user record.
  3. Enter required fields: Username, Employee link (if applicable), and assign at least one Security Role.
  4. Set authentication method (Dayforce native login or SSO/SAML).
  5. Configure org unit access and any additional role scoping.
  6. Save the user record; the user receives an activation email if native authentication is used.

Required fields: Username, Security Role (at least one), Authentication type (native or SSO), Employee record link (required for employee-type users)

Watch out for:

  • Users must be linked to an active employee record to access employee-facing features; system-only admin accounts may not require an employee link.
  • SSO users must have their username match the identity provider's NameID/email attribute exactly; mismatches cause login failures.
  • Security Roles must be configured before user creation; assigning an incomplete role can result in users seeing blank screens or access errors.
  • New users created outside of the HR hire workflow may not automatically inherit the correct org unit scoping.
Bulk option Availability Notes
CSV import Yes Bulk employee imports are performed via Main Menu > System Admin > Data Import or through the Dayforce Integration Studio using predefined import templates.
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise tier; requires SSO configuration and use of Dayforce's SAML 2.0 integration with the IdP. Native SCIM provisioning is not supported; user provisioning via IdP relies on SAML just-in-time (JIT) provisioning or custom API-based workflows.

How to remove or deactivate users

  • Can delete users: No
  • Delete/deactivate behavior: Dayforce does not support permanent deletion of user or employee records due to payroll audit trail and compliance requirements. Users are deactivated (terminated in the HR record or disabled in the security user record), which removes login access while preserving all historical data. The user record and associated transactions remain in the system for reporting and audit purposes.
  1. To disable login access only: Navigate to Main Menu > System Admin > Security > Users, locate the user, and set their status to Inactive or remove all Security Role assignments.
  2. To fully terminate an employee: Process a termination action through Main Menu > HR > Employee > Employment > Termination, entering the termination date and reason.
  3. Verify the employee's Dayforce login is disabled by confirming the user record status is Inactive.
  4. If SSO is in use, also disable or deprovision the user in the identity provider to prevent JIT re-provisioning on next login attempt.
Data impact Behavior
Owned records All employee records, pay history, time records, and HR transactions are retained indefinitely per Dayforce's data retention model. Deactivation does not remove any historical data.
Shared content Workflows, approvals, and documents associated with the deactivated user remain accessible to administrators and authorized roles.
Integrations API tokens or integration credentials associated with the user account should be reviewed and rotated; deactivating the user does not automatically revoke active API sessions.
License freed Terminating an employee record removes them from active headcount for billing purposes at the next billing cycle; timing depends on contract terms with Dayforce.

Watch out for:

  • Deactivating the security user record alone does not process a termination in the HR system; both actions may be required depending on the use case.
  • If SSO/JIT provisioning is active, a deactivated Dayforce user can be re-activated automatically if the IdP session is still valid and JIT is not blocked at the IdP level.
  • Rehired employees require careful handling; creating a duplicate employee record instead of reactivating the original causes data integrity issues.
  • Payroll must be finalized for the termination period before the employee record is fully closed; open pay periods can block termination processing.

License and seat management

Seat type Includes Cost
Active Employee (PEPM) Full access to licensed Dayforce modules (Payroll, WFM, HR, Benefits, etc.) based on the organization's contract. Each active employee in the system counts as a billable seat. $22–$31 per employee per month (publicly cited range; actual pricing is contract-specific)
Inactive / Terminated Employee Record retained in system for historical and compliance purposes; no active login access. Not counted in active seat billing after termination is processed. Not billed as active seat; historical record storage terms defined in contract
  • Where to check usage: Active employee headcount can be reviewed via Main Menu > HR > Reports or through the Dayforce Analytics module. Specific license usage reporting is typically reviewed with a Dayforce account manager or via the customer portal.
  • How to identify unused seats: Administrators can run user activity reports or audit login history via Main Menu > System Admin > Security > User Audit to identify accounts with no recent login activity. Dayforce does not provide a native 'unused license' dashboard; this requires custom reporting.
  • Billing notes: Dayforce pricing is per-employee-per-month (PEPM) based on active headcount. Implementation fees are typically 50–60% of first-year software costs and are billed separately. Module-specific licensing (e.g., adding WFM or Benefits) is negotiated at contract level. Billing adjustments for headcount changes are typically reconciled monthly or quarterly per contract terms.

The cost of manual management

Manual administration in Dayforce is high-friction by design. Creating a user requires pre-configured Security Roles, a linked employee record, and correct org unit scoping-any gap produces blank screens or access errors rather than a clear failure message.

Offboarding requires two separate actions: disabling the security user record and processing an HR termination. Skipping either step leaves partial access in place.

If SSO with JIT provisioning is active, a deactivated Dayforce account can be silently re-activated on the next IdP login-meaning every app downstream may regain access to an employee who has been terminated.

Dayforce provides no native inactive-user or unused-license dashboard. Identifying dormant accounts requires building custom reports against login audit logs, adding recurring administrative overhead with no guaranteed cadence.

What IT admins are saying

Practitioners consistently flag SSO configuration as the highest-friction area: SAML assertion requirements are complex, self-service documentation is limited, and most organizations require Dayforce support or an implementation consultant to complete the setup.

Security Role configuration is a recurring pain point. Out-of-box roles rarely match organizational needs, and the entitlement list is granular enough that misconfiguration is common-resulting in users seeing blank module screens or inadvertently accessing records outside their org unit.

The absence of SCIM is the most structurally significant gap. Teams using Okta, Entra ID, or OneLogin for provisioning must bridge to Dayforce's proprietary REST API via middleware (e.g., Okta Workflows, MuleSoft), which adds implementation cost and ongoing maintenance.

Common complaints:

  • Complex SAML assertion requirements make SSO configuration difficult without Dayforce support involvement.
  • Requires Dayforce support team or implementation consultant for SSO and IdP configuration; self-service documentation is limited.
  • Not natively supported in Azure AD (Entra ID) HR-driven provisioning; SCIM is not available, requiring custom API or manual workflows.
  • Security Role configuration is complex and time-consuming; out-of-box roles often require significant customization.
  • JIT provisioning via SAML can inadvertently re-activate deactivated users if the IdP is not also updated.
  • No native 'unused license' or inactive user dashboard; identifying dormant accounts requires custom report building.
  • Bulk user management via import templates is not well-documented and often requires consultant assistance.
  • Termination workflows require coordination between the HR record and the security user record; missing one step leaves login access open.
  • Role entitlement lists are extensive and poorly documented, making it difficult to audit what a given Security Role actually permits.

The decision

Dayforce is appropriate for organizations that have already committed to the platform as their system of record for HR and payroll and need to manage access within its native RBAC model. It is not a fit for teams expecting plug-and-play IdP provisioning or SCIM-based automation without additional middleware investment.

Key decision factors:

  • No native SCIM: every app that needs automated provisioning requires a custom integration or middleware layer.
  • SSO requires Enterprise tier and support involvement; budget for implementation time.
  • JIT re-provisioning risk is real and must be mitigated at the IdP level, not in Dayforce.
  • Security Role design should be completed before any user creation begins; retrofitting roles to existing users is time-consuming.

Bottom line

Dayforce gives enterprise HR teams a deeply configurable RBAC model and a single system of record for the full employee lifecycle, but it trades ease of administration for that depth.

There is no SCIM, no native inactive-user dashboard, and no automated bridge to IdP provisioning-meaning every app connected to your identity stack requires deliberate, manual coordination with Dayforce's HR and security workflows.

Organizations that invest in role design upfront and establish clear offboarding runbooks (covering both the security user record and the HR termination action) will get reliable access control; those that don't will accumulate access drift and audit risk over time.

Automate Ceridian Dayforce workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 4, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

Abnormal Security logo

Abnormal Security

API Only
AutomationAPI only
Last updatedMar 2026

Abnormal Security is an enterprise email security platform focused on detecting and investigating threats such as phishing, account takeover (ATO), and vendor email compromise. It does not support SCIM provisioning, which means every app in your stack

ActiveCampaign logo

ActiveCampaign

API Only
AutomationAPI only
Last updatedFeb 2026

ActiveCampaign uses a group-based permission model: every user belongs to exactly one group, and all feature-area access (Contacts, Campaigns, Automations, Deals, Reports, Templates) is configured at the group level, not per individual. The default Adm

ADP logo

ADP

API Only
AutomationAPI only
Last updatedFeb 2026

ADP Workforce Now is a mid-market to enterprise HCM platform that serves as the HR source of record for employee data — payroll, benefits, time, and talent. User access is governed by a hybrid permission model: predefined security roles (Security Maste