UKG Pro Hardening Guide
HCM platform hardening for UKG Pro including SAML SSO configuration, authentication upgrade features, and access controls
Overview
UKG (Ultimate Kronos Group) Pro is a leading cloud-based human capital management platform serving thousands of organizations worldwide. As a repository for sensitive employee data, payroll, and workforce management, UKG Pro security configurations directly impact data protection and compliance.
Intended Audience
- Security engineers managing HR systems
- HR administrators configuring UKG Pro
- IT administrators managing SSO integration
- GRC professionals assessing HCM security
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers UKG Pro security including SAML SSO, authentication features, role-based access control, and session security.
Table of Contents
- Authentication & SSO
- Access Controls
- Data Protection
- Monitoring & Compliance
- Compliance Quick Reference
1. Authentication & SSO
1.1 Configure SAML Single Sign-On
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO to centralize authentication for UKG Pro users.
Prerequisites
- Contact UKG Pro support to enable SAML SSO
- Include UFSSO@ukg.com in communications
- Obtain ACS URL and Entity ID from UKG
ClickOps Implementation
Step 1: Request SSO Enablement
- Contact your UKG Pro SSO Engineer
- Include UFSSO@ukg.com in recipient list
- If no assigned engineer, email UFSSO@ukg.com
- Request SAML SSO enablement and configuration values
Step 2: Configure Identity Provider
- Create SAML application in IdP (Okta, Entra, etc.)
- Configure with UKG-provided ACS URL and Entity ID
- Download IdP certificate and metadata
Step 3: Send Configuration to UKG
- Send Certificate (Base64) to UKG support
- Send SSO URL and configuration
- UKG configures SAML SSO connection on their side
Step 4: Test and Verify
- Test SSO authentication
- Verify proper user mapping
- Enable for production users
Time to Complete: ~1-2 weeks (includes UKG support coordination)
1.2 Configure Multiple Identity Providers
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 6.3 |
| NIST 800-53 | IA-2 |
Description
Configure multiple IdPs for different user populations.
Rationale
Why This Matters:
- UKG Authentication Upgrade supports multiple IdPs
- Each IdP has unique vanity URL
- Employees navigate to correct sign-in page
- Supports complex organizational structures
ClickOps Implementation
Step 1: Plan IdP Structure
- Identify user populations
- Determine IdP requirements per population
- Document vanity URL needs
Step 2: Configure Additional IdPs
- Work with UKG SSO team
- Configure each IdP separately
- Test each configuration
1.3 Configure Single Logout (SLO)
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 6.2 |
| NIST 800-53 | AC-12 |
Description
Enable IdP Service Level Objective (SLO) for session termination.
Rationale
Why This Matters:
- UKG supports IDP SLO functionality for SAML2
- Eliminates risks from not terminating IdP sessions
- Ensures complete logout across systems
ClickOps Implementation
Step 1: Configure SLO in IdP
- Enable SLO in identity provider
- Configure logout URL
- Test logout functionality
Step 2: Verify SLO
- Test complete logout flow
- Verify IdP session terminated
- Verify UKG session terminated
1.4 Configure SAML Response Signing
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Ensure SAML responses are properly signed.
Rationale
Why This Matters:
- UKG Workforce Central v8.1.2+ requires signed SAML responses
- In addition to signed SAML assertions
- Reflects security best practices
ClickOps Implementation
Step 1: Configure IdP Signing
- Enable SAML response signing in IdP
- Enable SAML assertion signing
- Use strong signing algorithms (SHA-256)
Step 2: Verify Configuration
- Test authentication flow
- Verify signatures validated
- Document configuration
2. Access Controls
2.1 Configure Role-Based Access Control
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Implement least privilege using UKG’s role model.
ClickOps Implementation
Step 1: Review Security Roles
- Review predefined roles
- Understand role capabilities
- Document role assignments
Step 2: Apply Least Privilege
- Assign minimum necessary access
- Separate HR and Payroll admin functions
- Avoid over-assigning admin roles
Step 3: Regular Access Reviews
- Quarterly access reviews
- Review terminated employees
- Update role assignments
2.2 Limit Admin Access
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Minimize and protect administrator accounts.
ClickOps Implementation
Step 1: Inventory Admin Users
- Review all admin accounts
- Document admin access levels
- Identify unnecessary privileges
Step 2: Apply Restrictions
- Limit admin accounts to 2-3 users
- Require MFA for all admins
- Monitor admin activity
2.3 Configure System Settings Security
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CM-6 |
Description
Configure system security settings.
ClickOps Implementation
For UKG Workforce Central:
- Log on as SuperUser
- Navigate to: Setup → System Configuration → System Settings
- Click Security tab
- Configure SSO and security settings
3. Data Protection
3.1 Configure Data Access Controls
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.3 |
| NIST 800-53 | AC-3 |
Description
Control access to sensitive employee data.
ClickOps Implementation
Step 1: Classify Data
- Identify sensitive fields (SSN, salary, etc.)
- Classify by sensitivity level
- Document classification
Step 2: Apply Access Controls
- Restrict access based on role
- Limit sensitive data visibility
- Audit data access
3.2 Configure Report Security
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.3 |
| NIST 800-53 | AC-3 |
Description
Control access to HR reports and analytics.
ClickOps Implementation
Step 1: Review Report Access
- Audit report permissions
- Identify sensitive reports
- Restrict as needed
Step 2: Configure Controls
- Apply role-based access
- Limit export capabilities
- Monitor report generation
4. Monitoring & Compliance
4.1 Configure Audit Logging
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable and monitor audit logs.
ClickOps Implementation
Step 1: Enable Auditing
- Configure audit settings
- Define retention period
- Set up monitoring
Step 2: Monitor Events
- Authentication events
- Data access events
- Configuration changes
- Admin actions
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | UKG Pro Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/MFA | 1.1 |
| CC6.2 | RBAC | 2.1 |
| CC6.6 | SLO | 1.3 |
| CC7.2 | Audit logging | 4.1 |
NIST 800-53 Rev 5 Mapping
| Control | UKG Pro Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| AC-6 | RBAC | 2.1 |
| AC-12 | SLO | 1.3 |
| SC-12 | SAML signing | 1.4 |
| AU-2 | Audit logging | 4.1 |
Appendix A: References
Official UKG Documentation:
- UKG Trust Center
- UKG Community Portal
- UKG Developer Hub
- UKG Cybersecurity (ESG)
- UKG Privacy and Data Protection
- Contact: UFSSO@ukg.com for SSO configuration
- UKG Pro SSO Documentation
- Microsoft Entra Integration
Compliance Frameworks:
- SOC 1, SOC 2 (Security, Confidentiality, Availability), ISO 27001, ISO 27017, ISO 27018 – via UKG Trust Center
Security Incidents:
- December 2021 – Kronos Private Cloud Ransomware Attack: UKG suffered a ransomware attack on its Kronos Private Cloud (KPC) platform, disrupting payroll and workforce management services for over 8,000 organizations including hospitals and Fortune 500 companies (MGM Resorts, PepsiCo, Tesla). The outage lasted several weeks. UKG agreed to a $6 million class action settlement and committed to expanded scanning, monitoring, and cold storage backup improvements.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO, RBAC, and security controls | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide