A cloud-based identity and access management service for securing user authentication and resource access
Yes, your understanding is correct.
In Workday → Microsoft Entra provisioning, attribute mappings are evaluated only when a worker is picked up in the incremental (delta) sync. After the initial full sync, the connector cannot be configured to run scheduled full syncs, and there is no mechanism to periodically re‑evaluate mappings based on time‑based logic (such as Now() or hire‑date comparisons).
Because no Workday transaction occurs between pre‑hire creation and the hire date, the worker does not appear in the delta feed, so the accountDisabled expression is not re‑evaluated. On‑demand provisioning works because it explicitly forces evaluation for that user, but it cannot be scheduled or used at scale.
To keep your intended behavior:
- Create AD account disabled when the worker becomes active in Workday
- Enable AD account 1 day before hire date
you will need to use one of the following supported approaches:
Option 1 – Workday‑driven trigger (recommended) Introduce a Workday attribute or business process that changes 1 day before the hire date (for example, a calculated flag or effective‑dated field). This generates a Workday transaction, causing the worker to appear in incremental sync and allowing the accountDisabled mapping to be re‑evaluated.
Option 2 – Downstream scheduled process Keep Entra provisioning focused on account creation, and handle enablement separately using a scheduled process (PowerShell, Azure Automation, or AD task) that:
- Identifies disabled AD accounts
- Compares against the hire date
- Enables the account 1 day before hire
This limitation is by design and applies to all time‑based provisioning scenarios.
For your reference: https://learn.microsoft.com/en-us/entra/identity/app-provisioning/workday-integration-reference