Demystifying Document Segmented Security
This blog post outlines a systematic approach to implementing document security segments in Workday, ensuring proper access control while maintaining a clean and manageable tenant. By following this structured method, organizations can simplify updates, enhance auditability, and efficiently manage document security across Workday. …
Audit, Audit, Read All About It: Simplify Workday Compliance with Audit Tags
SOX reporting tends to be extremely complicated in Workday and it can sometimes be impossible to create a custom report that touches on everything that you need. Let audit tags become your new best friend and use them to track changes on your custom reports, …
Empowering Adaptive Planning Security: Crafting Robust Access Rules for Enhanced Control
This blog discusses how Access Rules in Workday Adaptive Planning can be used to effectively manage data security without altering the structure of your financial statements. This approach enables users to access all relevant accounts while safeguarding sensitive information, ensuring your financial reports stay accurate …
Boosting Your Workday Security: Implementing Step-Up Authentication
Step-up authentication is a security process where the user is prompted to provide an additional verification when trying to access sensitive information, resources, or perform any high risk actions even when they are authenticated at an basic level. …
Custom DocuSign Tags: Going Beyond “signHere”
Custom DocuSign tags are a great way to expand your eSignature functionality in Workday. Learn how to add checkboxes, radio buttons, free text fields, and more to your e-signed documents. …
Absence Request Segmentation Made Easy with Workday Segmented Security
Segmented Security within Workday allows members of different security groups to request only certain time offs and/or leaves. Setting this up is not only simple, but it can also be an incredibly valuable add-on to your organization’s Workday configuration. …
What We Forget When a Worker Leaves an Organization
When an employee or contingent worker leaves an organization, there are many offboarding activities that occur. …
Redundant Role Assignments – Who Needs ‘Em??
Something that has always chapped my ass, and has made the maintenance of roles in Workday harder than it needs to be, are redundant role assignments. This can be especially challenging for large clients who need extremely granular supervisory role assignments. The concept here is …
Workday Report Sharing – What Reports Can My Managers See?
In my previous post “Business Process Booklet” I talked about regression testing business processes after making security changes. Today we talk reports. While these two exercises are similar, today we are going to answer a slightly different question: not “how do I know what reports …
Business Process Booklet – If You Don’t Know, Now You Know
It is safe to say I have been doing Workday security for quite some time. Over my years I have come across a few reports that no matter what project, client, size, or shape, I use, ALWAYS. The “Business Process Booklet” report is one of …
- 1
- 2







