0% found this document useful (0 votes)
55 views95 pages

Workday Icon

The document outlines the features and functionalities of Workday, including navigation elements like the Home page, search capabilities, and user account management. It details the configurable security framework that governs user access and permissions across various functional areas and business processes. Additionally, it explains reporting and analytics tools, including standard and custom report types, as well as integration systems for connecting Workday with external applications.

Uploaded by

Trinadh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views95 pages

Workday Icon

The document outlines the features and functionalities of Workday, including navigation elements like the Home page, search capabilities, and user account management. It details the configurable security framework that governs user access and permissions across various functional areas and business processes. Additionally, it explains reporting and analytics tools, including standard and custom report types, as well as integration systems for connecting Workday with external applications.

Uploaded by

Trinadh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 95

Workday Icon

Brings you back to your Home page.

Application Header

The application header remains the same wherever you navigate in Workday.

Search

Allows you to search for tasks, objects (such as workers, pre-hires, and organizations), and reports.
Predictive suggestions return common matching results. Search suggestions and results are based on
your security configuration, meaning you will only see results you can access.

You can indicate a category to target your search to a specific area of interest. Targeted searches
produce faster and more accurate results. You can set a preferred search category in your
preferences that defaults when you sign in. If you manually select a different category, that category
applies only to that search.

Search prefixes also allow you to narrow down your results to a specific type of search result. When
using a search prefix, Workday searches all items of that type and returns all the results available to
you. Examples of common search prefixes include "org:" for organizations and "bp:" for business
process definitions. To find all search prefixes you can use, enter "?" in your Search box.

Tasks

Using machine learning, Workday displays your most frequent tasks.

View All Apps

Select the link to view all applications and dashboards you have access to.

Worker Profile

Select your name or picture to view your worker profile, access the Worker Profile menu, manage
your user preferences, or sign out of your Workday session.

View Profile

Provides quick access to your worker profile.

My Account

Allows you to change your password and user account preferences.

Workbench

Provides technical administrators and implementers easy access to the tools they need to create and
manage custom reports, calculated fields, analytic indicators, and other administrative tasks and
reports.

Sitemap

Displays a list of the standard reports and tasks available to you, sorted by functional category.

Favourites
Provides access to a configurable list of favorite business objects, reports, and tasks. You can use
Favorites when searching in prompts.

Drive

Provides a central place to store your Workday files. You can set up Drive to consolidate file
management for several file types in Workday. Examples include Worksheets workbooks, plan
workbooks, Microsoft® Excel® and Word® files, images, media files, and PDFs.

Configurable Security

The Workday configurable security framework allows you to control what a user can access and do
in Workday. The framework provides a tenant-wide model for access across Workday, from tasks, to
reports, business processes, dashboards, and integrations.

When a user signs into a Workday tenant, their account is associated with many security groups.
What the user can do in Workday is based on the configured permissions for each of those security
groups.

Functional Areas

At the highest level, Workday delivers the application in functional areas (e.g., Staffing, Benefits,
Core Compensation, Financial Accounting, Procurement). Each functional area contains domains and
business process types.

Domains

Domains are collections of items that share the same security (e.g., tasks, delivered reports, report
data sources, web service operations). Workday determines the secured items within each domain,
and a given item may be in more than one domain. You cannot change the delivered items in each
domain.

Security Policies

To access a given secured item, a user must be a member of a security group with permissions to a
domain or business process security policy containing the item.

The different types of security policies are:

Domain Security Policies

Domain security policies allow you to configure which security groups can access the items in a
domain. You can also determine what type of access each security group has to those items (e.g.,
view-only vs. modify permission).

Workday groups the domain items into categories:

 Securable Actions: Includes items such as delivered reports and tasks.


 Securable Reporting Items: Includes items needed for custom reporting such as data
sources, data source filters, and report fields.

 Securable Integrations: Includes web service operations secured in the given domain.

Business Process Security Policies

Business process security policies allow you to configure the following types of permissions for the
business process type:

 Who can start the business process (including what actions initiate the business process).

 Who can perform action steps in the business process.

 Who can delegate an action to others.

 Who can perform actions on an entire business process.

 Who can view all.

 Who can approve.

 Who can cancel.

 Who can rescind.

 Who can manually advance.

 Who can deny.

Security Groups

A security group allows you to grant Workday access to a collection of system users. To add users to
security groups, you can either:

 Assign users to security groups manually.

 Derive membership based on information about users, such as their role assignments, job
profiles, or organization memberships.
There are many different types of security groups, but the most common are user-based and role-
based security groups. To learn about the difference between these two types of security groups,
view the information below.

User-based Security Groups

User-based security groups are the least restrictive security group type, providing members
unconstrained access to items in permitted security policies. This security group type is appropriate
for administrators or specific individuals who need system-wide access for their areas of
responsibility.

When you manually assign a user to a user-based security group, the permissions stay with that
user, regardless of position or job changes, until you manually remove them from the group.

Examples of user-based security groups include:

 HR Administrator

 Payroll Administrator
 Finance Administrator

 Security Administrator

 Report Writer

 Auditor

Workday provides several default user-based security groups as a starting point. You can also create
your own user-based security groups, as needed.

Role-based Security Groups

Role-based security groups are used frequently in Workday because they allow you to configure
access for your support and leadership staff.

Examples of role-based security groups include:

 Managers

 HR Partners

 Accountants

 Recruiters

You can allow these workers to access tasks, reports, and business process steps, but constrain them
to just the organizations that they support or lead.

Role-based security groups use a concept called an assignable role (or "role"). A role represents the
responsibilities a given assignee has for viewing, reporting, or managing data related to a specific
organization.

When you assign a role for an organization to a worker's position, subordinate organizations without
an existing role assignment typically inherit that assignment.

Roles are assigned to a position as opposed to a worker, allowing for easier maintenance. If the
worker in a position changes, the new worker will automatically assume the role assignment.

Business Process

When you need to complete a business objective in Workday, like hiring or terminating a worker,
you use a business process or workflow. A business process has steps that when placed in specific
order, determine the actions to take, and the security groups that must perform them.

A business process controls what needs to happen, who does it, and when they need to do it to
complete a transaction in Workday.

 What: Tasks, actions, and subprocesses


 Who: Workday security groups

 When: Defined time frame and order

Some common business processes help you hire workers, generate expense reports, and review
data entered in Workday.

Business Process Terminology

Term Definition

Business Process Event An instance of a business process.

Initiator The user that starts the business process event.

Target The subject of a business process event, like a worker or an expense report.

Business Process Definitions

A business process definition is where you configure the steps, condition rules, and security for a
business process, along with the order of the steps.

You can also configure notifications to send to users at different points in the business process.

Below is an example of a business process definition. To learn more about the different fields,
columns, and tabs, see the image below and the explanations that follow.
Business Object

Workday will use this business process definition for this organization and its subordinate
organizations. So in this example, if the worker is a member of the Workday University organization
(or its subordinates), Workday will use this Expense Report definition for the event.

Security Group Restrictions

Expand this section to view which security groups can initiate the business process. The allowed
security groups are configured on the business process security policy.

View Diagram

Select View Diagram for a visual representation of the business process definition. The lanes in the
diagram represent the security groups responsible for taking action on each step, along with possible
alternate routing for the steps.

Notifications

Workday can send notifications when the status of a business process changes, upon entry or exit
from a step, or when a task or process is overdue. Notifications appear in a user's Workday
Notifications or an outside email account.

You can view all of the delivered and custom notifications for the business process definition on the
Notifications tab.

Step

Select the Related Actions next to the magnifying glass to access more detail and configuration
options (like adding a condition rule or routing restriction) for the step.

Order

Identifies the order of execution for steps within a business process. The steps are processed in
alphabetical order, so step a is always the Initiation step.

Step ordering best practices include:

 Use lowercase letters.

 To insert a new step between existing steps, use multiple letters. For example, to insert a
step between b and c, you can use ba (the steps will then process as a, b, ba, c).

 When you remove a step, you can skip letters. For example, if you remove step b above, the
steps will then process as a, ba, c.

If

Lists condition rules that the event must satisfy for the step to occur.

Condition rules allow you to configure a business process to behave differently in certain situations.
The rules use logical statements connected to data in Workday to determine when an event meets
the specified criteria.

There are four types of condition rules:

 Entry conditions
 Validation conditions

 While running conditions

 Exit conditions

Type

Identifies the type of step (e.g., Action, Service, or To Do). See the next section for more detail on
available step types.

Group

Identifies the security group(s) responsible for the step. The business process security policy lists the
allowed security groups for each step.

Business Process Step Types

A step in a business process is either a task, a subprocess, or other action that either a user in a
security group or the Workday system must complete during a business process event.

Take a look at each section below to learn more about the different business process step types.

Initiation

Defines who can start the business process. It is always the first step in a business process and
cannot be removed.

Action

Prompts a user to review (and edit) the event's data or initiates a subprocess.

Approval

Gives the assigned user the opportunity to approve, send back, or deny the entire business process.
Approval step recipients cannot edit any information.

To Do

Sends an Inbox task to the assigned workers with instructions for a task inside or outside the
Workday system.

Service

Starts a separate processing thread for a Workday-delivered service (e.g., the creation of a Workday
user account).

Integration

Triggers a Workday system operation that transfers data to or from an external application. An
Integration step also initiates a separate processing thread.
Reporting & Analytics

The foundational frameworks we have covered so far - organizations, worktags, configurable


security, and the business process framework - all work together to make Workday a powerful and
user-friendly real-time reporting tool.

With transactions completed in the same system as reporting, the data is always accurate and up-to-
date. The configurable security model applied across the entire system ensures the right people
have access to the right information, including report data. And organizations and worktags provide
a variety of business dimensions to filter and analyze data.

Having all of this in one place provides a reliable single source of truth and makes Workday a
valuable tool for organizations to plan, execute, and analyze their business goals.

Standard Reports vs Custom Reports

Workday Standard Reports

Workday delivers standard reports that are available for all customers. If necessary, you can copy
many of the Workday-delivered reports to create a custom report and modify it as needed.

Below is an example of a standard report.


Custom Reports

Workday Report Writer lets you create custom reports to meet your business requirements. You
may start with an existing report or you may create your own reports from scratch. Either way, the
reports will adhere to your security configuration.
Below is an example of a custom report.

Custom Report Types

Advanced

Advanced reports allow you to display data from the primary and related business objects. These
reports are shareable. You can sort and filter the data, show groupings, and display sub and grand
totals. You can also add charts and enable the report as a worklet or web service.

Below is an example of an advanced report.


Matrix

Matrix reports allow you to group data, summarize the metrics for each grouping, and drill into the
summarizations for further analysis. In addition, matrix reports also provide for filtering, charts,
worklets, and report sharing.

Below is an example of a matrix report.


Composite

Composite reports enable you to combine data from multiple data sources into a single report by
using advanced or matrix subreports.

Below is an example of a composite report.


Search

Search reports display search results based on facet-filter selection values.

Below is an example of a search report.


Trending

Trending reports enable you to report on and analyze trends in worker data, such as headcount and
attrition over a period of time.

Below is an example of a trending report.


Report Definition

Advanced reports are the most common type of custom report. Below is an advanced custom report
definition. To learn more about the different configuration options, see the image below and the
following explanations of the highlighted sections.
Data Source

When creating a custom report, the most important decision is selecting your data source. The data
source drives the primary business object and view of the data. Data sources provide the starting
filter for your report.

Workday defines and delivers one or more data sources for most business objects.

Columns

Select the fields to include on the report and specify their sequence. The columns grid contains one
row for each column. In each row, define the business object, field, column heading overrides, and
options for how the field should display.

Note: You can only add fields that you have security access to.

Sort

Control the order to present and group data.

You can also specify options for displaying subtotals, grand totals, and outlines.

Filter

Add conditions to filter the primary business object.

Prompts

You can further narrow and refine your report results by having the user complete prompt fields
before they run the report. Specify prompt-related data about your report. You can set default
values for prompts, so users do not have to enter values when running a report. You can also hide
prompts that have default values, so users do not see them at run time.

Output

Override the default output options, including output type, worklet options, and help text. By
default, a custom report renders as a table. You can change this to display the report as a chart,
chart and table, or gauge.

Share

Share the report with other users or groups. By default, only the report owner can see a custom
report. You can only share a report with users who have access to the report data source. Sharing a
report allows other users to run and copy the report.

Advanced

Defines additional report options. Some include enabling save parameters, enabling a report as a
web service, enabling a report for Worksheets, or changing the expiration information for temporary
reports.

Business Object

Advanced reports allow you to display data from the primary and related business objects. The
business object you select here determines the fields that are available in the Field column.

Field
Each business object has many Class Report Fields (CRFs). In the Field column, specify the field from
the business object to display in the report.

Why use Platform and Product Extensions?

While the core Workday product areas satisfy most general business needs, not all businesses that
run on Workday purchase all of these products. They may need to integrate Workday with third-
party systems, such as external payroll systems.

Additionally, some businesses may want to add their own custom functionality to Workday.

Platform and Product Extensions integrate, connect, extend, and securely tailor Workday to meet
these nuanced business needs.

In the following lessons, you will learn about two platform and product extensions:

 Workday Integration Systems

 Workday Extend

Workday Integration Systems

What is an Integration System?

An integration allows data to pass between Workday applications and external systems. An
integration system provides the methodology for communicating data.

Integration Tools

Workday provides a variety of tools to integrate data with external systems. View the list below to
learn more about each tool.

Enterprise Interface Builder


Enterprise Interface Builders (EIBs) are the simplest integration systems, and are best suited for low-
volume, straightforward integrations without conditional logic, error handling, or configurable maps
and attributes.

EIBs enable you to use a spreadsheet template to input or output Workday data files one at a time
using one web service, one transformation, and one endpoint.

Example: Use an EIB to input annual bonus data for all workers. To do so, create an inbound EIB,
generate its prebuilt spreadsheet template, enter the data, and upload it back to Workday.

The image below shows an inbound EIB for annual bonuses on the Create EIB task.

Cloud Connect
Cloud Connect, or connector integration systems, are integration templates that allow for
configuration but use mostly prebuilt functionality. Connectors do not require you to interact
directly with web services or reports to source the data; instead, they rely on the integration
template and its configured integration services.

There are two types of connectors: end-to-end connectors and generic connectors.

 End-to-end connectors integrate with a specific endpoint/vendor, like a healthcare provider,


or in a specific template/format, like an international banking standard.

 Generic connectors generate a specific category of Workday data, such as payroll or job
position data.

Document Transformation

Document transformation integration systems modify input or output files for connectors.
Document transformation has basic error message and warning functionality.

To use document transformation, you create an XSLT attachment that modifies the connector's XML
file as needed.

The image below shows the Create Integration System task using the Document Transformation
template.
Workday Studio

Workday Studio is an Eclipse™-based integrated development environment (IDE) that enables you
to:

 Build custom integrations.

 Exchange bulk data with external endpoints.


 Upload integrations to Workday.

Workday Studio is the most complex and customizable integration tool you can use for Workday
integrations. Though Workday maintains and updates Workday Studio, it is its own desktop
application.

Businesses choose Workday Studio for integrations with multiple data sources, complex error
handling, large datasets, conditional logic, or sophisticated change detection.

The image below shows the Workday Studio user interface.


Workday Extend

Workday Extend is a tool to build apps that run inside the Workday cloud. Extend apps have a
consistent user interface (UI) with Workday, can access Workday data seamlessly, and fit within the
same security framework, allowing businesses the same flexibility with user access.

The following image shows that Workday Extend allows businesses to:

 Streamline and automate new workflows within Workday.

 Create new experiences within Workday.

 Bring Workday into natural workspaces.

 Create industry-specific extensions and applications.


Workday Extend in Action

The demonstration below follows the creation of a custom employee recognition app. You may
know that adding worker feedback is native functionality of Workday. So, why create your own app
instead of using the native feedback functionality? In our example, the native Workday feedback app
does not allow the worker to be awarded a monetary gift for positive feedback. We will build a
custom app to provide that feature.
The process steps below follow the creation of an employee recognition app. Managers can enter
positive feedback for an employee and also provide a one-time monetary award.

Task 1: Create the User Interface (UI)

Use metadata to create Extend apps. Workday internally compiles this data, resulting in the running
app that users interact with in Workday.

Developers use JavaScript Object Notation (JSON) to create pages, custom objects, or tasks.

The image below shows metadata and the resulting app page in Workday.
Task 2: Embed Workday Security into the App

Because Extend apps conform to the Workday security framework, developers need to create
domains and security groups so that users can access the app.

The image below shows the metadata behind creating a security domain and the domain as it
appears in Workday.

Task 3: Code the App to Interact with Workday Data APIs

How does the data get from the app back into Workday? Workday Extend finds data and brings it
back to the Extend app using a type of API called a REST (Representational State Transfer) API.

APIs (Application Programming Interfaces) allow two applications to communicate. Each time you
use an app to check the weather, for example, your device is retrieving the information using an API.

The image on the left shows the metadata for an API operation being executed via an outbound
endpoint. The image on the right shows the REST API Explorer, which documents REST APIs by
functional area.
Task 4: Deploy App to a Tenant

To deploy the app, developers sign in to both the developer site and their development tenant.

Developers need to sign in to the developer site because it provides access to the Extend AppHub.
The AppHub is a central location where all a developer's app code exists.

As shown in the image below, a status popup appears during deployment. Once the deployment is
complete, the popup displays a URL to test the app.
Task 5: Test App

After deployment, developers can test the Extend app by opening Workday on their development
tenant and entering the name of the custom task in the Search bar.

The image below shows the Search bar in a development tenant.


Other Possible reasons to create a custom app include:

 Enable employees to donate to charities with one-time and recurring payroll deductions.

 Create a tuition reimbursement request app to submit a one-time payment.

 Order business cards.

 Register worker vehicles with the company parking lot.

Note: None of the above apps are part of the core Workday app. However, Workday Extend allows
you to create the apps your company needs.

Workday Adaptive Planning

Workday Adaptive Planning is a cloud-based planning and analysis application. It allows you to:

 Import your business's actuals data.

 Create budgets and forecasts.

 Apply the results of your plans back into financial statements, providing visibility into the
true impacts of your plans.

This means businesses can accurately model scenarios, monitor performance, analyze current and
past performance, and report on data.

While Adaptive Planning centers on financial planning, it also supports workforce and sales planning.

Note: Workday Adaptive Planning is a separate application from the core Workday application.

Key Functional Elements

Accounts

Accounts are containers that group actuals or planning information, such as income, expenses,
assets, liabilities, sales, and any business metrics. You can use sheets and reports to view and edit
this data.

Time

Time lets you view and configure the time period structure for your model. There is one default
calendar and up to three alternate calendars.

Time is monthly by default but configurable depending on business requirements.


Sheets

Sheets serve as the interface for financial managers and planners to enter, store, display, and
analyze data. This can include actual ledger data, forecasts, personnel information, and budgets.

When you save a sheet, you update the data stored on the server.

Reporting & Analytics

Reporting & Analytics combines real-time analytics with integrated transactional data to support
enterprise planning.

You can pull data from Adaptive Planning to:

 Run HTML reports.

 Create dashboards for self-service, interactive visualizations, and charts to monitor and drive
business performance.

 Build reports using OfficeConnect for Excel, Word, and PowerPoint.

You can view planning data on reports, which allow several ways to view, filter, and sort the data.

As shown in the report image below, users select a version and choose a level. Green values indicate
actuals data, while black values indicate plan data. Only some fields are editable. Fields in gray are
accounts that contain formulas. The rows also represent accounts.
Levels

Levels are the organizational structures of a business. Levels represent companies, departments,
cost centers, profit centers, or geographical regions. An organization structure models the
operations of a business and the way data rolls up for planning and analysis.

For example, department values can roll up to the country level, and country values can roll up to
the company level.
Levels allow administrators to control data visibility. For example, managers in the United Kingdom
can only view data for levels related to the United Kingdom. They cannot view data related to levels
in the United States.

The image below displays levels for a university. Cost centers for each department roll up into
academic affairs, which rolls up into the cost center hierarchy, which then rolls up into the
university.

Dimensions

A dimension is a logical category with a list of values. For example, a dimension called Region might
have values of North, South, East, and West. You use dimensions to input data and to create
hierarchies that are independent of the level structure.
You can use dimensions to tag data and view it in different groupings, for example headcount by job
status, sales by product, or expenses by project.

Attributes

Attributes are logical groupings with lists of possible values. You can use attributes to tag accounts,
dimensions, and levels. For example, you could create attributes to represent different roll-up
hierarchies for your organization, including geographical hierarchies and functional hierarchies.

You can create attributes on accounts, levels, and dimensions.

Versions

Versions represent scenarios, such as displaying:

 Company actuals data.

 Next year budget data.

 A three-year plan.

 A what-if plan to evaluate the effects of a specific business transaction.

Versions often represent a calendar or financial year.

The image below highlights a version representing the final budget for 2022.
In the next section, you'll learn how to navigate Workday Adaptive Planning.
Workday Peakon Employee Voice

What is Peakon?

Peakon is an intelligent listening platform that converts confidential employee feedback into insights
that leaders can use to help create more responsive, fulfilling, and productive workplaces.
Employees can instantly and confidentially share their thoughts, concerns, and ideas with their
organization's leadership using a survey format.

How does a Peakon survey work?

First, you receive a survey link via email, text message, Slack, Microsoft Teams, the Workday mobile
app, or a Kiosk login code. This survey will include questions, a scale to answer the questions, and a
place to enter comments. Keep in mind that all responses are entirely confidential. No one in the
organization can identify who has provided any particular answer or feedback, including coworkers
and leaders.

Take a look at the information below to learn more about questions, the scale, and comments.

Questions

Survey questions may include topics such as employee engagement, transformation and change,
health and wellbeing, and diversity and inclusion.
Scale

As shown in the image below, questions have a 0 to 10 scale, for you to rate how strongly you agree
with the statement that describes your experience at work.

If you are unsure how to answer a question, it is best to skip it using the Skip question button. For
example, you may choose to skip a question when you are new to a role and are unsure how it
applies, or if the question does not relate to your role.
Comments

Once you have rated a question from 0 to 10, you have the option to elaborate on your experience
or leave suggestions in the Comments box shown in the image below. We highly recommend adding
comments, whenever possible. Comments provide more insight to your leader on how and where to
improve.
Processing the Feedback

Feedback is aggregated on the leader's dashboard, which displays priorities and strengths to indicate
what drives job satisfaction in their team, as well as areas where improvement may be necessary.

Depending on access controls, leaders may initiate conversations by reacting to survey comments.

They may also send acknowledgments via email to let you know they have received your feedback
and share any next steps.

Remember, you remain anonymous throughout the entire process. Even if you reply to a
conversation or receive a comment, your responses remain confidential.
Prism Analytics Overview

Workday Prism Analytics provides executives and managers with a full picture of their business with
analytics in Workday using any source of data.

Workday defines many data sources. Data sources are:

 The data visible on a Workday screen.

 Where custom reports come from.

 Defined by Workday and are not editable.

 Not able to be created from scratch.

Prism Analytics is a data hub that enables you to blend Workday data with high volumes of non-
Workday data to uncover new insights in your Workday reports, dashboards, and discovery boards.
It provides the ability to ingest, blend, and transform Workday data with external data and publish
the output as a new Prism data source.
Extended Ecosystem

Includes pulling in data from subsidiary, contract labor, or third-party Finance and HR applications.

Example: Data from contingent labor, time tracking, survey, planning, financial, or stock vesting.
Workday also uses Prism to power applications like People Analytics and Accounting Center.

Operational Insights

Includes data from third-party, industry, or home-grown applications for company-specific decision
support on topics as wide ranging as capacity planning, sales performance, and deep profitability
analysis.
Example: Policies and claims data for insurance, point-of-sale data for hospitality, and loan data for
banks.

History

Enables long-term historical trends by bringing in data from legacy applications such as PeopleSoft,
ADP, SAP, or Oracle's E-Business Suite.

Example: People and financial history. Once you have the data you need from your legacy systems,
you can retire them to reduce costs.

Let's review an example of Prism Analytics at work.

Business Case

Review the Prism process flow as we work through the following business case:

The music department at Workday University will be holding a fundraiser. Current students working
a call center will reach out to former alumni from the program. Based on the results of those calls,
they will then send out invitations to an alumni donor event. Alumni data is housed in an external
tool called AlumniBase. We need to report on the external alumni data from AlumniBase to assist
the students' efforts in the call center to reach out to alumni. They can do this using Prism Analytics.

Process Flow 1: Acquire Data - Data Catalog

To ingest data into Prism Analytics, you start with the data catalog, shown in the image below. Here
you can create, edit, and view Prism entities like tables, datasets, and data change tasks.
Process Flow 2: Acquire Data - Table Data

A key Prism entity is the table. You can create tables, or schemas, based on four techniques:
 Parsing an uploaded file with the data extracted from an external system. You can upload
these files directly, using SFTP or a REST API.

 Using an existing table in Prism.

 Using a Workday report.

 Manually creating a table.

The image below shows a comma-separated values file or CSV file. We extracted this data from
AlumniBase, the external database that holds alumni information. Although we used the CSV file
format, there are other types of data that you can import.
Process Flow 3: Acquire Data - Table Creation Options

You create new tables using the data catalog. In the steps of the Create Table task shown above, you
first enter the table details. Then, you specify how you want to create the table. In our case, we are
directly uploading the file. Once you make your selections, you can create the table.

When creating a table, Prism displays a preview of the imported data. There are many different
formatting options available, like whether you want to use:

 Row Delimiter symbols.

 Field Delimiter symbols.

 Field names from the data file.

Process Flow 4: Acquire Data - Data Change Tasks


After saving the table, Prism places you into a view mode as shown in the image below. The available
quick actions include editing the schema (table) or creating a data change task.

A data change task allows you to change or refresh the data in a table. You can save and reuse date
change tasks to edit and rerun at any time. Using data change tasks, you can:

 Insert new rows.

 Update specific rows based on a key field.

 Delete specific rows based on a key field.

 Insert unique rows and update existing rows in the same activity. This is called an upsert
operation.

Note: You publish data as datasets not tables. Recall the stated goal is to create new data sources in
Workday to enhance your displays and reporting by using data that is external to Workday.
Process Flow 5: Acquire Data - Create a Derived Dataset

Once you have a table, you can create a derived dataset from the table as shown in the image
below. Derived datasets will blend and transform existing datasets and tables into one final dataset
for publishing. The number of derived datasets you need mainly depends on the degree of
modularity and reuse required, as well as the complexity for maintenance, testing, and
troubleshooting.

Process Flow 6: Transform Data - Pipelines


Datasets have one or more pipelines. A pipeline is a container of stages that models the flow of how
data transforms. You can change the pipeline and add stages using the Edit Transformation action,
which is one of the available quick actions.

When you add a stage, you are defining how you want to manipulate the data with options like:

 Filters

 Group By

 Joins

Example: If you wanted to limit your data to alumni in a specific state, you could add a Filter stage. If
you wanted to get a count of alumni by state, you could use the Group By stage.
Process Flow 7: Transform Data - Stages

The first stage in a pipeline brings in data from a source. Stages occurring after the first stage in a
pipeline, take the output of the earlier pipeline as the input to the current stage. Each stage is one
step in a development pipeline. The last stage of any pipeline is the output for that pipeline for the
entire dataset.

Therefore, when you publish a dataset, the output of the primary pipeline materializes as the data in
the Prism data source. An example of a stage is shown in the image below.
Process Flow 8: Publish Data

After performing the needed transformations, you are ready to publish the dataset. There is a Quick
Action pull-down for publishing, as shown in the first image below. Once you publish the dataset,
Workday will show you the status of the publish operation, as shown in the second image below.
Workday creates a data source for reporting when a dataset is published.

Process Flow 9: Report on Prism Data

You can use Prism data sources like any other Workday data source and build reports using Report
Writer or Discovery Boards.

Using Report Writer, you can create simple, advanced, transposed, and matrix report types using
Prism data sources.

The first image below is an example of building a custom report. Notice that we selected our
AlumniDataDS as the data source for the report. This confirms successful publishing of the Prism
dataset. Review the report in the second image below.
Process Flow 10: Report on Prism Data - Additional Reporting Options

You can also create discovery board visualizations using Prism data sources. There are many
visualization types, such as heat maps, pivot tables, and line charts.

Additionally, you can create calculated fields on the Prism business object, but it does not support all
calculated field functions.
Putting it All Together

You should now have a better idea of how Workday Prism Analytics enhances the data experience in
Workday. Review the graphic below that summarizes the Prism process.
Up next, we will review organization types in Workday and then further explore two specific types of
organizations: companies and locations.
Companies in Workday

Companies are organizations in Workday that represent the internal business entities within an
enterprise. For each company created in Workday, you can record business transactions, produce
financial statements, and create statutory reports.

Currency

You have the option to specify a base currency for each company. Doing so enables you to use
multiple currencies across your Workday deployment.

In the next section, you'll learn how to create a company.

What is a Location?

In Workday, locations are organizations that extend your ability to manage and report on business
facilities, equipment, and the workers who use them. Each company you create resides in a specific
location. You can set up location usages and identify location assets. For example:

 Indicate standard work hours for employees.

 Provide contact and shipping information.

 Manage the organizations and positions assigned to locations.

 Track and assign resources and spaces.

Take a look at the list below to learn more about the characteristics of locations.
Physical Address

Locations always include a physical address. You can also include details like an email address or
phone number.

Postal Code Validation

You can set up postal code validations to validate or require codes. You can also set country-specific
postal codes validations.

Time Profile

A location's time profile defines the standard number of hours worked in that location each week.

Locale

A location's locale controls the format for the date, time, and currency. If you specify a locale for a
location, workers in that location inherit the locale.

Use Cases

Locations are versatile and the use cases for locations vary depending on the products configured in
the tenant. Read through the use cases below to review how businesses use locations with various
Workday products.

Use Case 1: Business Processes

You need to provide different onboarding documents for employees in different locations. You can
use locations as a criteria in a business process condition rule to target specific locations.

Recall that some business process definition steps have Workday-delivered entry conditions that you
cannot edit. However, you can specify additional entry conditions for these steps, and Workday will
evaluate the conditions when the business process runs. Keep in mind that Workday will skip any
step that does not satisfy all the entry conditions.
Use Case 2: Financials

 Define location hierarchies based on regulatory regions.

 Set up locations for geographical financial reporting if physical locations align with financial
reporting requirements.

 Configure storage locations for shipping goods and services for procurement.

Use Case 3: Human Capital Management

To set up local HR support for a global company, you can:

 Define a location for each building where employees work.

 Define a global location hierarchy to group locations like city, state, country, and continent.

Use Case 4: Payroll

You can use locations to restrict schedules and wages based on local regulations.

Use Case 5: Recruiting

You can enable:

 Recruiters to access reports and tasks for candidates and available jobs based on city, region,
and country.

 Job candidates to search for jobs based on locations.

Use Case 6: Reporting

To report on all locations in a region, you can configure the region as the location hierarchy instead
of selecting individual locations.

Use Case 7: Security

You have HR partners assigned by superior organization, but there are workers in different countries
within the same organization. You can create separate local HR partner roles and assign them to
each location hierarchy based on country. Then you can assign security based on the intersection of
the groups so that the HR partner only has access to data for the workers they support.

Use Case 8: Student

You can:

 Track and report on usages and schedules.

 Enable instructors to select classrooms based on attributes like physical location, capacity,
ADA compliance, and equipment.

In the demonstration in the next section, we'll show you how to create a location in Workday.

Location Hierarchies
A location hierarchy is an ordered structure of locations. Workday automatically includes workers as
members of location hierarchies when the hierarchy includes the location of their position. Like
locations, location hierarchies are geographic attributes of Workday objects that make reporting on
locations and the objects assigned to them easier. For example, you can:

 Assign security by location.

 Assign roles on a location hierarchy.

 Report on groups of locations by hierarchy instead of manually selecting individual locations.

 Build condition rules based on location hierarchy to improve efficiency and reduce
maintenance.

As displayed in the graphic below, you can create a location hierarchy for California and configure
San Francisco, Los Angeles, and San Diego as subordinate locations. The California location hierarchy
is a subordinate location of the Western U.S. location hierarchy.
Example: Workspaces

Workspaces are specific locations, such as a desk, office, or cubicle, related to each worker's
position. You can create workspaces as part of a location hierarchy. A workspace must be
subordinate to another location within a location hierarchy.
Workday Configurable Security

In the Workday Basics course, you learned about the Workday configurable security framework at a
high level and explored user-based and role-based security groups.

How Does a User Get Access to a Secured Item?

Recall that a user gains access to a secured item through belonging to a security group which has
permissions to a domain or business process containing the item.

Take a look at the information below to learn how a user gains access to the Create Benefit Plan task,
which is a securable item.

Domain

Domains are collections of items that share the same security (e.g., tasks, delivered reports, report
data sources, web service operations).

Workday determines the secured items within each domain, and a given item may be in more than
one domain.

Example: The Benefits domain houses the Set Up: Benefits security policy.

Security Policy

To access a given secured item, a user must be a member of a security group with permissions to a
domain or business process security policy containing the item.

There are two types of security policies:

 Domain Security Policies: Allow you to configure which security groups can access the items
in a domain. You can also determine what type of access each security group has to those
items (e.g., view-only vs. modify permission).

 Business Process Security Policies: Allow you to configure who can do certain types of
actions for a business process type (e.g., initiate the BP or approve steps in the BP).
Example: The Benefits Administrator security group has both view and modify permissions to
reports and tasks for the Set Up: Benefits domain security policy.

Security Group

Users gain access to secured items through membership in security groups, rather than as individual
users.

A security group allows you to grant Workday access to a collection of system users who need
similar access.

Example: Users, such as benefits administrators, belong to the Benefits Administrator security
group.

Secured Item

Items are what users can view or do in Workday, such as reports and tasks. Workday groups secured
items into domains and business process types, which belong to security policies.

For a user to gain access to a secured item, the user needs to belong to a security group which has
permissions to a domain or business process containing the item.

Example: The Create Benefit Plan task is a secured item in the Set Up: Benefits security policy. Users
need modify permissions to access this task, so only members of the Benefits Administrator and
Implementers security groups can access it.

Target Access Constraints

By configuring a security group in a domain or business process security policy, members can access
the secured items in those policies, such as reports, tasks, or events. However, some security group
types can enforce constraints on what target instances of data members can access.

Consider the following types of constraints:

 Self-service groups grant members access to only their own instance of data. This means
they can only view data directly related to them.

 Constrained security groups grant members access to a subset of data when accessing a
securable item. What target instances users can access typically depends on the
organizations they belong to.

 Unconstrained security groups grant users access to all target instances of a securable item.

Take a look at the image below and its following information to learn how members of these types
of security groups gain access to different target instances of data on the Total Rewards report.
Chaaya Basu

Chaaya is a member of the Employee As Self self-service security group with access to the Total
Rewards report.

Due to the constraints of this type of security group, she can only run the report for her own
instance of data. Chaaya cannot run the report for other workers.
Jared Ellis

Chaaya's manager, Jared, is a member of the Manager role-based constrained security group and the
Employee As Self group.

The Manager security group can access the Worker Data: Total Rewards domain, which gives Jared
the ability to run the Total Rewards report for his team, as well as for himself.

Logan McNeil

Logan is a member of an unconstrained security group, Compensation Administrator, as well as the


Manager and Employee As Self security groups.

Because of her unconstrained access, Logan can run the Total Rewards report for any worker.

You should now have a firmer understanding of how the Workday configurable security framework
allows users to gain access to data.

Location Membership Security

For each location you create, you can create a location membership security group that holds all
workers in that location. For example, you can create a group for all workers in Dallas or all Canadian
home office workers.

Once you create a security group for a location, Workday automatically adds all workers based in
that location to the security group. However, this does not automatically grant those workers any
security access. You need to give the security group permissions to domain security policies.

Use Cases

Take a look at the information below to learn about possible use cases for location membership
security groups.

Home Office (U.S.) workers

Workers in the U.S. based at their home office can access a work-from-home stipend to purchase
office equipment.

Dallas workers

Workers based in Dallas can view and participate in giving and doing events in Dallas.

Japan workers

Workers based in Japan can create and take on gigs (temporary projects) in Japan.
Note: Location membership security groups are unconstrained. This means that Workday does not
match worker location to the location of the secured item.Let’s say you create a security group for
all workers in Japan, and you grant this security group permission to view sales reports. Without
additional configuration, members will be able to view reports with data for all countries, not only
Japan.

Organization Membership Security

Just as location membership security groups hold all workers based in a certain location,
organization membership security groups hold all workers who belong to a certain organization.

You can create an organization membership security group for workers in any organization type
except location, which has its own security group type (location membership). For example, you can
create a security group for all members of a pay group, company, supervisory organization, or cost
center.

Target Access Constraints

Organization membership security groups can be either constrained or unconstrained. Recall that:

 Constrained security groups grant members access to a subset of data when accessing a
securable item.

 Unconstrained security groups grant users access to all target instances of a securable item.

Constrained Organization Membership

Constrained organization membership security groups grant members access to target data only for
the organizations to which they belong.

For example, Workday University could use a constrained organization membership group to grant
security access to all HR partners in the Human Resources organization. Then, they could constrain
the HR partners to target data related to only the organizations they support. In this way, the HR
partner who supports IT HelpDesk can only access HR-related data for IT HelpDesk employees.
Unconstrained Organization Membership

Unconstrained organization membership security groups grant members security access to any
target data in the system.

For example, Workday University could use this security group type to grant members of the
executive management group access to all financial data in the system.
Job-Based Security

Job-based security groups identify workers in a specific job criterion. Group criteria options include:

 Management level (e.g., Individual Contributor)

 Job category (e.g., Sales Labor)

 Job family (e.g., Sales Operations)

 Job profile (e.g., Sales Proposal Specialist)

Target Access Constrains

Like organization membership, job-based security groups can be either constrained or


unconstrained.

Constrained Job-Based Security

Constrained job-based security groups identify workers in a given job criterion and grant members
access to target data only for the organizations to which they belong.

For example, Workday University could use a constrained job-based security group to identify deans
based on management level. Then, they could constrain them to target data in the school they
manage (e.g., Workday University School of Law).

Unconstrained Job-Based Security


Unconstrained job-based security groups grant members access to any target data in the system.

For example, Workday University could use an unconstrained job-based security group (Workers in
IT) to grant security access to workers in any of the IT-related job families. Target data may include
reports that index worker computer models and software permissions.

Business Case

IT HelpDesk employees sometimes need to answer support calls during off-hours. For this reason,
Workday University is going to provide a cell phone allowance, but only wants IT HelpDesk
specialists to have access to this item when creating expense reports.

In the following demonstration, we will create a job-based security group for workers with the job
profile of IT HelpDesk Specialist to use for this purpose. We will also review the various configuration
options.
Putting It All Together

In Workday Basics, you learned that the Workday configurable security framework allows businesses
to control what a user can access and do in Workday. A user gains access to a securable item
through membership in a security group, which has permissions to a domain or business process
containing the item.

In this section you learned that constrained security groups grant members access to a sub-set of
data when accessing a securable item. And unconstrained security groups grant users access to all
target instances of a securable item. You also learned about three additional security group types:

 Location membership, which group workers who are based in a specific location.

 Organization membership, which group workers who belong to a specific organization.

 Job-based, which group workers based on management level, job category, job family, or job
profile.

In the next section, you will review business processes and learn about routing restrictions and
delegation.

Business Process Overview

Workday Business Processes (BPs) are the cornerstone of many applications. BPs route tasks to
authorized users based on their membership in security groups and organization hierarchy.

Business Process Functionality

Maintain Advanced Routing

Routing restrictions enable you to configure business process steps so that Workday excludes
selected individuals from the workflow routing based on your selections. Using advanced routing
allows you to secure and streamline business processes. Refer to the image below and the following
definitions to learn more about the options available with advanced routing restrictions.
Routing Restrictions

Routing restrictions secure and streamline business processes by further controlling who interacts
with a business process.

Exclude Initiator
Excludes the worker who initiated the event.

Example: If the supplier administrator creates a supplier request, it should not be sent to them for
approval.

Exclude Prior Approvers

Excludes any workers who previously approved any step of the process.

Example: If a worker already approved compensation details for a new hire, they do not need to
additionally approve the entire hire event.

Exclude Event Subject

Excludes the worker if they are the event's target object.

Example: If the HR partner is terminated, they should not review their own termination.

Alternate Routing

Alternate routing allows you to designate an alternate security group to complete the step instead.

Relative to the Transaction

Specify an alternate security group based on the event.

Example: Select the manager of the worker who is the event subject.

Relative to the Excluded User(s)

Specify an alternate security group based on the excluded user.

Example: If the event excludes the initiator, route to their manager.

One Use per Group per Organization Required

Require interaction from only one user per security group, if you required multiple security groups to
interact with it.

Business Case

The HR Partner for IT HelpDesk is retiring. To ensure this individual will not perform the tasks for
their own termination, in the following demonstration, we will configure an advanced routing
restriction as we review the Termination business process workflow.

Delegation

What is Delegation?
Delegation temporarily assigns your tasks to another worker, enabling that worker to perform
individual actions on your behalf. A delegate can only access tasks that you delegate, in addition to
any tasks specified in the delegation configuration.

You configure delegations on the Manage Delegations task. Refer to the image below and the
following definitions to learn more about the fields on the Manage Delegations task.
Begin Date and End Date

Delegation begins and ends based on the time zone of the delegator. These fields may be required
depending on tenant configuration.

Delegate

Select the worker you want to delegate the tasks to. If necessary, you can configure the tenant to
restrict the delegates available in this prompt.

Start on My Behalf

This prompt is only for delegating the initiating action of a business process, not for delegating Inbox
tasks.

Do Inbox Tasks on My Behalf

Select whether to delegate Inbox tasks for all business processes, or a specific business process. Or
you can also select None of the Above to remove the ability to do Inbox tasks while retaining the
ability to initiate a specific business process.

Retain Access to Delegated Tasks in Inbox

Typically selected by default when selections are made in the For all Business Processes or For
Business Process fields above. If selected, both you or the delegate can complete the tasks.

Clear this checkbox if you do not want to get notifications and access the tasks from your own Inbox.

Delegation Rule

Optionally, you can apply delegation rules to the business processes selected above. Delegation
rules relevant to the business processes will display in the prompt.
Connect

Make it easy to connect people, applications, and services by enabling set-up process flows.

Easy Configuration

Enable administrators to configure all aspects of BPs without the help of IT staff.

Save Time

Enable you to copy and modify over 550 preconfigured BPs.

Third-Party Applications

Ensure that leaders have access to the latest data by integrating third-party applications.

Audits

Supply an audit trail after a BP completes.

Notifications

Speed up communication with BP participants by using notifications.

Security

Use BP security policies to determine who can participate and what actions they can perform.

In Workday Basics, you learned that when you need to complete a business objective in Workday,
you use a business process or workflow. A business process has steps that, when placed in a specific
order, determine the actions to take and the security groups that must perform them. In the
following lesson, the video will refresh your understanding of business processes and learn about
two specific features of business processes: advanced routing restrictions and delegations.

Additional Reporting Features

In Workday Basics, you learned that Workday provides a powerful and user-friendly real-time
reporting tool. Reporting in Workday allows businesses to plan, execute, and analyze their goals.

In this section, you will review the reporting framework and then learn about sharing, scheduling,
and exporting reports.

Standard Reports vs. Custom Reports

Standard Reports

Workday delivers standard reports that are available for all customers. If necessary, you can copy
many of the Workday-delivered reports to create a custom report and modify it as needed.
Customers can use the Workday Standard Reports report to look up all standard reports in a certain
category. For example, as shown in the image below, the Expenses report category includes the
following standard reports:

 Average Expense Cycle Times: This report details the average expense processing times for
approval and payment in days by cost center.

 Average Expense Report Total: This report details the average total expense amount for
approved expense reports by cost center.

 Credit Card Personal Charges: This report lists expense report lines or line itemizations that
are credit card charges and identified as a personal expense.
Custom Reports

Workday Report Writer allows you to create custom reports to meet your business requirements.
You can start with an existing report, or you can create your own reports from scratch.
Recall that Workday stores data in business objects, similar to database tables or worksheets in
Excel. Just as a database table or worksheet has columns and rows, a Workday business object has
fields and instances.

The report data source provides the view into the primary business object. This object gives you
access to class report fields as well as links to related business objects.

The image below provides examples of these business objects and data sources.
Report Security

Recall that a security group gets access to a security domain, which is a predefined set of related
securable items. Securable items can include reports, tasks, data sources, and report fields. Both
standard and custom reports adhere to the Workday configurable security framework.

Review the table below for examples of security access for report-related securable items.

Permitted Security
Securable Item Security Domain Impact
Groups

Accountant

Accounting
Standard Report: Find Manager Members of these security groups can run t
Process: Journals
Journal Lines standard report.
Finance Auditor

Implementers

Manager

Task: Create Custom Report Writer Members of these security groups can creat
Custom Report Creation
Report Setup Administrator reports.

Implementers

Payroll
Administrator
Data Source: All Set Up: Payroll Members of these security groups can creat
Customer-Owned (Calculations - Payroll Payroll Partner reports that use this data source (assuming
Deductions Specific) Payroll Auditor report is shared with them).

Implementers

Accountant

Report Field: Billing Billing Specialist Members of these security groups can acce
Process: Billing
Schedule Cash Manager report field and create reports with it.

Implementers

Report Definitions

A report definition is the object in Workday that organizes the data sources and filter options that
you use to produce a specific report. When you run a report, Workday pulls data from the data
sources and creates a report with specific instances of that data. For example, the report definition
might designate the data source of Worker. Then, when you run the report, it displays individual
worker names (e.g. Logan McNeil, Jack Taylor).

By default, a custom report definition is visible only to its owner and to users who have access to
manage all custom reports. Workday does not automatically share custom report definitions. For
each report, you can determine the groups and users to share it with.

The domain securing the custom report's data source determines which security groups you can
share the custom report with.

Report Sharing Options

As shown in the image below, the Share tab on a custom report allows you to share the report
definition with authorized users. Any changes you make to the report are immediately visible to all
shared users.

You can share a custom report with either all users or specific groups and users who have access to
the report data source and data source filter.

Example

The Employee Audit by Organization custom report allows shared users to view sensitive worker
data, such as base salary, hire date, social security number, age, and emergency contacts. However,
those users can only view data in the report for which they have security access. The report owner,
Logan McNeil, has shared this report definition with users who have the job profile of Manager.

Logan McNeil's Access

Logan McNeil is the owner of the Employee Audit by Organization custom report. She is also a user
with security access to all data sources and report fields for the report.

For her organization, Global Modern Services, Inc. (USA), she can view the following fields for all
workers:

 Employee

 Supervisory Organization

 Total Base Pay Annualized in USD - Amount

 Hire Date

 Social Security Number - Formatted

 Age

 Emergency Contacts
Jack Taylor's Access

Jack Taylor is a manager and therefore has the security access to run the report. However, he does
not have access to all the data sources and report fields. He can only view some of the fields for
himself, and an even smaller subset of fields for the employees he manages. For example, he cannot
view personal data like Social Security Number, age, or emergency contacts.
Note: When you share a report definition, users can view and run the report but cannot edit it. Only
the report owner, and those who can manage all custom reports, can edit custom reports.
Additionally, a shared user can copy the report definition, if that user is also a member of the report
writer security group.

Exporting Reports

Several options are available for exporting reports, for example Excel files or PDFs.

For advanced report types, there are more available export options. For example, you can enable a
report for Worksheets. You can also enable web service, which allows you to use the custom report
in an outbound integration. It also makes the report available to Prism Analytics.

Enable As Web Service

When you edit an advanced report, the Advanced tab allows you to enable the report as a web
service, enable for Worksheets, and enable for Prism.

The image below shows the Advanced tab for the Worker Expense Reports custom report from the
previous lesson, which is enabled as a web service.
What's Next
Congratulations on passing the exam and completing the course content. Before you are done with
the course, review additional information included in this section. Below you will find job search tips
depending on the type of role you are interested in exploring.

Careers with Workday Customers

When you work for a Workday customer, you get to become an expert in their specific business,
industry, and requirements. You can evaluate the features of each release to find out if they are a
good fit for your organization and become the go-to Workday expert.

You can view our customer list and filter by industry here. Note that not all customers are listed, so a
search on a job posting site will provide the most options!

Review the information below to learn about potential careers with Workday customers.

Business Analyst

If you are interested in configuration and deploying new features, you will search for business
analyst roles. However, the job title might vary depending on the company, the industry, and the
functional area.

For example, a business analyst focused on Workday HCM might have the job title of HRIS Analyst or
HCM Analyst. Or a business analyst focused on Workday Financial Management might have the title
of Financial Systems Analyst.

There are different focus areas for business analysts, depending on your specific interests:

 Functional analysts are responsible for configuring business process workflows, security,
reporting, and analytics.

 Technical analysts are responsible for building and maintaining integrations, assisting with
complex reports, and managing the broader system landscape.

 Change analysts focus on stakeholder management, communications, and training.

To make sure you can view all available opportunities on job posting sites, it is safest to search for
the keywords: "Workday analyst".

Business Partner

If you are more interested in a functional role that uses Workday for transactions, you will search for
business partner or business user roles.

Again, the titles for these types of roles will vary by functional area. For example, in Human
Resources, this role is usually called HR Business Partner. In Finance, it could be a Financial Analyst
or Accountant.

If you know which functional role you're interested in, just add Workday into your job search to find
job postings from Workday customers. They will typically list Workday somewhere in the job posting.

Program Manager

Workday program managers are responsible for managing the budget and resources for day-to-day
maintenance, as well as optimization and enhancement initiatives.

Careers with Workday Partners


Deployment consultants get to work with a wide range of customers in different industries and
locations. Consultants may work on initial deployments, when the customer is converting from
another system (or no system) to Workday. Or they may deploy new products into a customer's
existing Workday system.

Deployment time frames vary by customer size and complexity, as do project team sizes. So,
consultants are always working on something new, often with new people, and figuring out how
their customer can make the most of the Workday system.

There are different types of deployment consultants, depending on your experience and area of
interest. Expand each section below to learn about potential careers with Workday partners.

Functional Consultant

Functional consultants, also referred to as deployment consultants, are certified by Workday


Education to configure specific functional areas of Workday. They work closely with customers
during their Workday deployments, leading requirements-gathering sessions, and configuring
Workday to meet the customer's business needs.

Data Conversion Consultant

Data conversion consultants migrate data from the customer's previous legacy system into Workday.
If you love tools like Microsoft Excel and MySQL, this could be the role for you!

Integration Consultant

Integration consultants design and build integrations with other systems. Integration consultants
become experts in various Workday integration and reporting tools and work with external vendors
to create and maintain connections to keep data up to date in both places.

For example, in this role, you might build an integration to support single sign-on (SSO), benefit
elections, or tax filings–just to name a few.

Project Manager

Project managers and engagement managers work closely with the customer's program
management team and stakeholders to organize resources and deliverables for a deployment.

Experience Levels

Review the experience (seniority) levels in this industry, starting from least amount of prior
experience needed to most, below.

1. Associate

2. Senior Associate

3. Staff

4. Senior

5. Principal

You can find a list of all of our services partners here!

Careers with Workday


Working for Workday provides a wide variety of job opportunities. We are a customer ourselves, and
have a large consulting team, so the roles covered in the other career sections are also available at
Workday.

There are lots of other types of roles to explore. For example, the Workmates who created this
course are instructional designers, eLearning developers, content editors, and video editors.

Here are just a few of the different teams at Workday:

 Customer Operations

 Product Management

 Sales

 UX and Design

Check out our career site to learn more about our teams, our culture, employee benefits, and to
search open positions!

Workday also offers training, internships, and job opportunities for nontraditional candidates, like
veterans, caregivers, and young adults. Learn about our Opportunity Onramps programs here.

Workday Education

If you join the Workday ecosystem, we look forward to meeting you in one of our Workday
Education offerings!

Workday Education helps customers and members of the Workday ecosystem deploy and best use
their Workday applications. Our training ranges from strategic topics, such as learning to deploy
Workday at a company site, to specific information about new features in the latest Workday
release.

We offer a variety of learning delivery options from independent, self-paced offerings to high-end,
interactive activities in the Workday tenant. We also offer customer accreditations and partner
certifications. You can learn more at Workday.com.

You might also like