0% found this document useful (0 votes)
1K views2 pages

Workday Security Configuration Guide

1. Business process (BP) and domain security policies control access to workflows and data in domains. Each BP and domain has its own unique security policy. Security is configured at the domain level to control group access to all items within a domain. 2. Security configuration testing ensures data is only visible and accessible to authorized users. It checks what users can see, initiate, approve, or reject based on their permissions. 3. Thorough testing of business process configurations and security is important since security is often overlooked. It is critical to test what access different user roles have in the system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views2 pages

Workday Security Configuration Guide

1. Business process (BP) and domain security policies control access to workflows and data in domains. Each BP and domain has its own unique security policy. Security is configured at the domain level to control group access to all items within a domain. 2. Security configuration testing ensures data is only visible and accessible to authorized users. It checks what users can see, initiate, approve, or reject based on their permissions. 3. Thorough testing of business process configurations and security is important since security is often overlooked. It is critical to test what access different user roles have in the system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1) Configure BP and Domain Security Policies

 According to me regarding configurations it Represents the events or transactions in WD that


can be automated using WD's business process framework.
 Each BP Type has its own security policy.
 It has its own domain security policies
 In the Domain security policy, you can configure which security groups have access to the items
in the domain
 We can Access and configured at the domain level, not item-by-item. Users with access to a
domain will have access to all items secured in that domain.
 The security policy for a BP that determines which security groups can do what within a BP,

For Example: Initiate, do action steps, approve, rescind, cancel, correct, etc.

2) Test WD security configuration

 Workday security configuration Testing is all about how to safeguard your data from
unauthorized access and being misused. 
 It is being done at the time of configuring workday or making any modifications or with frequent
workday releases.
 It focuses on what data your users can see when they log in, what are the Business
Processes  they can initiate or approve/reject.
 The entire procedure is just to ensure that tenant data is protected and visible to the
authenticated users only.

For Example: A user should be able to view his manager’s basic details
like Designation, Name etc. But he must not access his manager’s compensation.
Likewise, there can be many other scenarios in which a User might have the permission
to View and Edit some of his personal details like Name, Address, Email But could not edit his Salary
structure.
All such enormous and complex scenarios are handled by Workday security configuration Validator.

3) WD Security Configuration and Administration experience

 Our business process configuration (your flow and approvals) and security are the two
most critical areas of your configuration to test.
 security is often overlooked during testing.
 An Accessed Person can see in your tenant and which business processes they can
initiate, approve, and reject, it’s a critical element of functionality that needs to be
tested to give a level of assurance. Here’s when we recommend that you run security
tests.
 Due to administration wise I create lot reports and security policies for admin access
 Data migrations and data conversations has done
4) Creation of security groups    Workday Report Writing

 WD determines the allowed security group types and provides a set of default security groups
of these types

 You can also create new security groups of these delivered types (Role Based, User based, Job-
Based Security Group)

 Workday reports are mainly we use -SIMPLE, ADVANCED, and for financial sectors we use
matrix reports and composite reports
 I have created number of simple and standard and advance reports in workday
 Uses different data sources and creating diff calculated fields

You might also like