Paylocity Hardening Guide
HCM platform hardening for Paylocity including SAML SSO configuration, MFA enforcement, and role-based access controls
Overview
Paylocity is a leading cloud-based human capital management (HCM) and payroll platform serving thousands of organizations. As a repository for sensitive employee PII, financial data, and payroll information, Paylocity security configurations directly impact data protection and regulatory compliance.
Intended Audience
- Security engineers managing HR systems
- HR administrators configuring Paylocity
- IT administrators managing SSO integration
- GRC professionals assessing HR platform security
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Paylocity security including SAML SSO, MFA, role-based access control, and session security.
Table of Contents
- Authentication & SSO
- Access Controls
- Data Protection
- Monitoring & Compliance
- Compliance Quick Reference
1. Authentication & SSO
1.1 Configure SAML Single Sign-On
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO to centralize authentication for Paylocity users.
Prerequisites
- Paylocity account with SSO feature enabled
- Contact Paylocity Support (service@paylocity.com) to enable SAML 2.0
- SAML 2.0 compatible identity provider
ClickOps Implementation
Step 1: Request SSO Enablement
- Contact Paylocity Support at service@paylocity.com
- Request SAML 2.0 enablement for your account
- Obtain SSO configuration access
Step 2: Configure Identity Provider
- Create SAML application in IdP
- Configure attribute mappings per Paylocity requirements
- Download IdP metadata
Step 3: Configure Paylocity SSO
- Navigate to: HR & Payroll → User Access → SSO Configuration
- Select Add SSO Integration
- Select your SSO provider from dropdown
- Upload or drag-and-drop metadata file
- Paylocity parses Issuer, Post Redirect, Binding URLs, and Certificates
- Select Save
Step 4: Test Configuration
- Test SSO authentication
- Verify attribute mapping
- Enable for production
Time to Complete: ~2 hours
1.2 Enable Multi-Factor Authentication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require MFA for all Paylocity users.
Rationale
Why This Matters:
- MFA adds critical layer beyond passwords
- Guards against credential theft
- Required for accessing sensitive employee PII
- Supports biometric and one-time codes
ClickOps Implementation
Step 1: Configure via SSO IdP
- Enable MFA in identity provider
- All SSO users subject to IdP MFA policies
- Use phishing-resistant methods for admins
Step 2: Configure Native MFA (if applicable)
- Enable MFA for direct login users
- Configure supported methods:
- One-time codes
- Authenticator apps
- Biometric verification
- Require MFA for all admin accounts
1.3 Configure Session Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.2 |
| NIST 800-53 | AC-12 |
Description
Configure session timeout and security controls.
ClickOps Implementation
Step 1: Configure Session Controls
- Session control extends from Conditional Access
- Configure session timeout
- Protects against data exfiltration
Step 2: Enable Conditional Access (via IdP)
- Configure conditional access policies
- Require compliant devices
- Block risky sign-ins
2. Access Controls
2.1 Configure Role-Based Access Control
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Implement least privilege using Paylocity’s RBAC model.
Rationale
Why This Matters:
- RBAC enforces organizational policies
- Employees only perform permitted actions
- Critical for protecting employee PII
- Supports multiple role types
ClickOps Implementation
Step 1: Review Security Roles
- Navigate to: User Access → Security Roles
- Review predefined roles:
- HR Admin
- Payroll Specialist
- Manager
- Employee
- Understand role capabilities
Step 2: Assign Minimum Necessary Access
- Apply least-privilege principle
- Assign roles based on job function
- Avoid over-assigning admin roles
Step 3: Create Custom Roles (if needed)
- Create custom roles for specific needs
- Define granular permissions
- Document role purposes
2.2 Limit Admin Access
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Minimize and protect administrator accounts.
ClickOps Implementation
Step 1: Inventory Admin Users
- Review all users with admin roles
- Document admin access
- Identify unnecessary privileges
Step 2: Apply Least Privilege
- Limit HR Admin to 2-3 users
- Limit Payroll Specialist access
- Remove unnecessary admin access
Step 3: Protect Admin Accounts
- Require MFA for all admins
- Use phishing-resistant MFA
- Monitor admin activity
2.3 Configure Manager Self-Service
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Configure appropriate manager access for self-service functions.
ClickOps Implementation
Step 1: Define Manager Permissions
- Configure manager view access
- Limit to direct reports only
- Restrict sensitive data access
Step 2: Configure Approval Workflows
- Enable manager approval workflows
- Configure time-off approvals
- Set up expense approvals
3. Data Protection
3.1 Configure Data Access Controls
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.3 |
| NIST 800-53 | AC-3 |
Description
Control access to sensitive employee data.
ClickOps Implementation
Step 1: Classify Data Sensitivity
- Identify PII fields (SSN, salary, benefits)
- Classify by sensitivity level
- Document data classification
Step 2: Apply Access Restrictions
- Restrict SSN access to authorized roles
- Limit salary visibility
- Control benefits data access
3.2 Configure Report Access
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.3 |
| NIST 800-53 | AC-3 |
Description
Control access to HR reports and analytics.
ClickOps Implementation
Step 1: Review Report Permissions
- Audit report access by role
- Identify sensitive reports
- Restrict as needed
Step 2: Configure Report Security
- Apply role-based report access
- Limit export capabilities
- Monitor report generation
4. Monitoring & Compliance
4.1 Configure Audit Logging
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable and monitor audit logs for security events.
ClickOps Implementation
Step 1: Review Audit Capabilities
- Understand logged events
- Configure audit retention
- Set up monitoring
Step 2: Monitor Key Events
- User authentication events
- Data access events
- Configuration changes
- Permission changes
4.2 Configure Compliance Controls
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CA-7 |
Description
Configure controls for regulatory compliance.
ClickOps Implementation
Step 1: Enable Compliance Features
- Configure for SOX compliance (if applicable)
- Enable audit trails for payroll changes
- Document approval workflows
Step 2: Regular Reviews
- Conduct quarterly access reviews
- Review terminated employee access
- Document compliance status
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Paylocity Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/MFA | 1.1 |
| CC6.2 | RBAC | 2.1 |
| CC6.6 | Session security | 1.3 |
| CC7.2 | Audit logging | 4.1 |
NIST 800-53 Rev 5 Mapping
| Control | Paylocity Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| IA-2(1) | MFA | 1.2 |
| AC-6 | RBAC | 2.1 |
| AC-3 | Data access | 3.1 |
| AU-2 | Audit logging | 4.1 |
Appendix A: References
Official Paylocity Documentation:
- Trust Center
- Protecting Our Clients
- Client Support
- Identity and Access Management Guide
- SSO Integration
- Trust Center Controls
- Contact: service@paylocity.com for SSO enablement
API Documentation:
Compliance Frameworks:
- SOC 1 Type II, SOC 2 Type II, ISO 27001:2022 — via Trust Center
Security Incidents:
- November 2018: A misconfiguration incident temporarily exposed personal information (names, SSNs, addresses) of employees from one client to the administrator of another Paylocity client. No evidence of external attacker involvement. No major breaches of Paylocity infrastructure have been publicly reported since.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO, RBAC, and data protection | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide