Workday Security Overview
Providing Workday access to a group of employees is a relatively simple task. However granting access to an entire organization may be less than ideal, as specific individuals or sub-sets of groups may need to be excluded. Learn more about the tools available to help secure your data at a more granular level.
Architecting a smart security solution begins by asking basic questions: who, what, when, where and why?
Who: Security group
Who needs to have access? This is typically defined in Workday as a security group. The most common type is a role-based security group, wherein access is granted directly to a user, who becomes part of the group. It is commonly constrained to an organization (company, location, etc.). Security groups can also be unconstrained—thus, granting access across the entire system.
Security group: HR partner:
- Security group type
- Role-based security group (constrained)
- Role use
- Supervisory organization, company, location
- Access rights to organizations
- Applies to current organization and unassigned subordinates
Get the full white paper on Workday security
Download Alight's complete white paper on Understanding Workday Security.