1) Configure BP and Domain Security Policies
According to me regarding configurations it Represents the events or transactions in WD that
can be automated using WD's business process framework.
Each BP Type has its own security policy.
It has its own domain security policies
In the Domain security policy, you can configure which security groups have access to the items
in the domain
We can Access and configured at the domain level, not item-by-item. Users with access to a
domain will have access to all items secured in that domain.
The security policy for a BP that determines which security groups can do what within a BP,
For Example: Initiate, do action steps, approve, rescind, cancel, correct, etc.
2) Test WD security configuration
Workday security configuration Testing is all about how to safeguard your data from
unauthorized access and being misused.
It is being done at the time of configuring workday or making any modifications or with frequent
workday releases.
It focuses on what data your users can see when they log in, what are the Business
Processes they can initiate or approve/reject.
The entire procedure is just to ensure that tenant data is protected and visible to the
authenticated users only.
For Example: A user should be able to view his manager’s basic details
like Designation, Name etc. But he must not access his manager’s compensation.
Likewise, there can be many other scenarios in which a User might have the permission
to View and Edit some of his personal details like Name, Address, Email But could not edit his Salary
structure.
All such enormous and complex scenarios are handled by Workday security configuration Validator.
3) WD Security Configuration and Administration experience
Our business process configuration (your flow and approvals) and security are the two
most critical areas of your configuration to test.
security is often overlooked during testing.
An Accessed Person can see in your tenant and which business processes they can
initiate, approve, and reject, it’s a critical element of functionality that needs to be
tested to give a level of assurance. Here’s when we recommend that you run security
tests.
Due to administration wise I create lot reports and security policies for admin access
Data migrations and data conversations has done
4) Creation of security groups Workday Report Writing
WD determines the allowed security group types and provides a set of default security groups
of these types
You can also create new security groups of these delivered types (Role Based, User based, Job-
Based Security Group)
Workday reports are mainly we use -SIMPLE, ADVANCED, and for financial sectors we use
matrix reports and composite reports
I have created number of simple and standard and advance reports in workday
Uses different data sources and creating diff calculated fields