Skip to content
Alight named by Fortune as one of the ‘100 Best Companies to Work For’ in 2024

White paper: Understanding Workday Security

Workday Security Overview

Providing Workday access to a group of employees is a relatively simple task. However granting access to an entire organization may be less than ideal, as specific individuals or sub-sets of groups may need to be excluded. Learn more about the Workday security tools available to help protect your data at a more granular level.

Architecting a smart security solution begins by asking basic questions: who, what, when, where and why?

Who: Security group

Who needs to have access? This is typically defined in Workday as a security group. The most common type is a role-based security group, wherein access is granted directly to a user, who becomes part of the group. It is commonly constrained to an organization (company, location, etc.). Security groups can also be unconstrained—thus, granting access across the entire system.

Security group: HR partner:

  • Security group type
    • Role-based security group (constrained)
  • Role use
    • Supervisory organization, company, location
  • Access rights to organizations
    • Applies to current organization and unassigned subordinates

Get the full white paper on Workday security

Download Alight's complete white paper on Understanding Workday Security.

Related Insights


White paper: Workday Advanced Compensation

Looking to learn more about Workday Advanced Compensation? Alight shares best practices and our learnings as a future-minded Workday partner.

Alight’s guide to Workday in the Public Sector: A technical perspective

Download our eBook and explore how Workday and Alight can guide you through modernization in the Public Sector.

Modernizing Public Sector HR operations with Workday and Alight

Download our eBook to discover how you can become an employer of choice in today's tight talent market with Workday and Alight.