You’re dealing with a multi-layered integration problem that requires addressing all four critical areas systematically.
Manager Identity Mapping: Your current Azure AD attribute mapping is incomplete. You must add manager attribute mapping with proper DN resolution:
Attribute Mapping (Enhanced):
Azure AD mail -> Dayforce email
Azure AD displayName -> Dayforce full_name
Azure AD employeeId -> Dayforce employee_number
Azure AD manager (DN) -> Dayforce manager_employee_id (transformed)
The transformation is critical because Azure AD stores manager as a DN like “CN=John Smith,OU=Users,DC=company,DC=com” but Dayforce needs the manager’s employee_number. Implement a lookup transformation that extracts the manager DN, queries that user object, retrieves their employeeId attribute, and maps that to Dayforce’s manager_employee_id field.
Azure AD Attribute Configuration: Configure additional attributes in your Azure AD sync scope. Beyond basic user attributes, you need:
// Pseudocode - Required Azure AD attributes:
1. Query user object with $expand=manager parameter
2. Extract manager.employeeId from expanded object
3. Map to Dayforce organizational hierarchy manager field
4. Ensure manager object exists in Dayforce before mapping (referential integrity)
5. Handle cases where manager is null (executives, CEO)
Also enable delta sync so manager changes in Azure AD propagate to Dayforce within minutes rather than waiting for full sync cycles.
Workflow Approval Logic: Access Dayforce workflow configuration and verify the approval routing method. Navigate to Business Process Configuration > Onboarding Workflows > Approval Steps. The manager approval step should be configured as:
- Approval Type: “Direct Manager from Org Hierarchy”
- Fallback Approver: HR Manager (for cases where direct manager is null)
- Lookup Method: “Employee Manager Relationship”
If it’s currently set to “Role-Based” or “Custom Routing”, that explains why approvals aren’t routing correctly. The workflow engine is looking for role assignments rather than organizational hierarchy relationships.
Integration Service Account Permissions: Your Azure AD app registration needs elevated Graph API permissions. Current required permissions:
- User.Read.All (delegated and application)
- Directory.Read.All (application)
- Group.Read.All (application, if using group-based manager assignments)
Verify these in Azure Portal > App Registrations > Your Dayforce Integration App > API Permissions. After adding permissions, click “Grant admin consent” - this is critical and often overlooked. Without admin consent, the permissions don’t actually take effect even if they’re listed.
Additionally, check the integration service account in Dayforce has the “Manage Organizational Hierarchy” security role. This allows it to write manager relationships to employee records.
For your 23 stuck onboarding workflows, you’ll need to manually remediate them after fixing the integration. Go to each workflow instance, verify the manager is now correctly identified in the employee record, then use the “Reassign Task” function to push the approval to the correct manager’s queue. Going forward, new onboarding workflows should route correctly once all four areas are properly configured.
Implement monitoring on the Azure AD sync job to alert when manager attribute mappings fail - this will catch issues before they impact workflows. We log every manager mapping operation and alert if the failure rate exceeds 2%.