Workday Icon
Workday Icon
Application Header
The application header remains the same wherever you navigate in Workday.
Search
Allows you to search for tasks, objects (such as workers, pre-hires, and organizations), and reports.
Predictive suggestions return common matching results. Search suggestions and results are based on
your security configuration, meaning you will only see results you can access.
You can indicate a category to target your search to a specific area of interest. Targeted searches
produce faster and more accurate results. You can set a preferred search category in your
preferences that defaults when you sign in. If you manually select a different category, that category
applies only to that search.
Search prefixes also allow you to narrow down your results to a specific type of search result. When
using a search prefix, Workday searches all items of that type and returns all the results available to
you. Examples of common search prefixes include "org:" for organizations and "bp:" for business
process definitions. To find all search prefixes you can use, enter "?" in your Search box.
Tasks
Select the link to view all applications and dashboards you have access to.
Worker Profile
Select your name or picture to view your worker profile, access the Worker Profile menu, manage
your user preferences, or sign out of your Workday session.
View Profile
My Account
Workbench
Provides technical administrators and implementers easy access to the tools they need to create and
manage custom reports, calculated fields, analytic indicators, and other administrative tasks and
reports.
Sitemap
Displays a list of the standard reports and tasks available to you, sorted by functional category.
Favourites
Provides access to a configurable list of favorite business objects, reports, and tasks. You can use
Favorites when searching in prompts.
Drive
Provides a central place to store your Workday files. You can set up Drive to consolidate file
management for several file types in Workday. Examples include Worksheets workbooks, plan
workbooks, Microsoft® Excel® and Word® files, images, media files, and PDFs.
Configurable Security
The Workday configurable security framework allows you to control what a user can access and do
in Workday. The framework provides a tenant-wide model for access across Workday, from tasks, to
reports, business processes, dashboards, and integrations.
When a user signs into a Workday tenant, their account is associated with many security groups.
What the user can do in Workday is based on the configured permissions for each of those security
groups.
Functional Areas
At the highest level, Workday delivers the application in functional areas (e.g., Staffing, Benefits,
Core Compensation, Financial Accounting, Procurement). Each functional area contains domains and
business process types.
Domains
Domains are collections of items that share the same security (e.g., tasks, delivered reports, report
data sources, web service operations). Workday determines the secured items within each domain,
and a given item may be in more than one domain. You cannot change the delivered items in each
domain.
Security Policies
To access a given secured item, a user must be a member of a security group with permissions to a
domain or business process security policy containing the item.
Domain security policies allow you to configure which security groups can access the items in a
domain. You can also determine what type of access each security group has to those items (e.g.,
view-only vs. modify permission).
Securable Integrations: Includes web service operations secured in the given domain.
Business process security policies allow you to configure the following types of permissions for the
business process type:
Who can start the business process (including what actions initiate the business process).
Security Groups
A security group allows you to grant Workday access to a collection of system users. To add users to
security groups, you can either:
Derive membership based on information about users, such as their role assignments, job
profiles, or organization memberships.
There are many different types of security groups, but the most common are user-based and role-
based security groups. To learn about the difference between these two types of security groups,
view the information below.
User-based security groups are the least restrictive security group type, providing members
unconstrained access to items in permitted security policies. This security group type is appropriate
for administrators or specific individuals who need system-wide access for their areas of
responsibility.
When you manually assign a user to a user-based security group, the permissions stay with that
user, regardless of position or job changes, until you manually remove them from the group.
HR Administrator
Payroll Administrator
Finance Administrator
Security Administrator
Report Writer
Auditor
Workday provides several default user-based security groups as a starting point. You can also create
your own user-based security groups, as needed.
Role-based security groups are used frequently in Workday because they allow you to configure
access for your support and leadership staff.
Managers
HR Partners
Accountants
Recruiters
You can allow these workers to access tasks, reports, and business process steps, but constrain them
to just the organizations that they support or lead.
Role-based security groups use a concept called an assignable role (or "role"). A role represents the
responsibilities a given assignee has for viewing, reporting, or managing data related to a specific
organization.
When you assign a role for an organization to a worker's position, subordinate organizations without
an existing role assignment typically inherit that assignment.
Roles are assigned to a position as opposed to a worker, allowing for easier maintenance. If the
worker in a position changes, the new worker will automatically assume the role assignment.
Business Process
When you need to complete a business objective in Workday, like hiring or terminating a worker,
you use a business process or workflow. A business process has steps that when placed in specific
order, determine the actions to take, and the security groups that must perform them.
A business process controls what needs to happen, who does it, and when they need to do it to
complete a transaction in Workday.
Some common business processes help you hire workers, generate expense reports, and review
data entered in Workday.
Term Definition
Target The subject of a business process event, like a worker or an expense report.
A business process definition is where you configure the steps, condition rules, and security for a
business process, along with the order of the steps.
You can also configure notifications to send to users at different points in the business process.
Below is an example of a business process definition. To learn more about the different fields,
columns, and tabs, see the image below and the explanations that follow.
Business Object
Workday will use this business process definition for this organization and its subordinate
organizations. So in this example, if the worker is a member of the Workday University organization
(or its subordinates), Workday will use this Expense Report definition for the event.
Expand this section to view which security groups can initiate the business process. The allowed
security groups are configured on the business process security policy.
View Diagram
Select View Diagram for a visual representation of the business process definition. The lanes in the
diagram represent the security groups responsible for taking action on each step, along with possible
alternate routing for the steps.
Notifications
Workday can send notifications when the status of a business process changes, upon entry or exit
from a step, or when a task or process is overdue. Notifications appear in a user's Workday
Notifications or an outside email account.
You can view all of the delivered and custom notifications for the business process definition on the
Notifications tab.
Step
Select the Related Actions next to the magnifying glass to access more detail and configuration
options (like adding a condition rule or routing restriction) for the step.
Order
Identifies the order of execution for steps within a business process. The steps are processed in
alphabetical order, so step a is always the Initiation step.
To insert a new step between existing steps, use multiple letters. For example, to insert a
step between b and c, you can use ba (the steps will then process as a, b, ba, c).
When you remove a step, you can skip letters. For example, if you remove step b above, the
steps will then process as a, ba, c.
If
Lists condition rules that the event must satisfy for the step to occur.
Condition rules allow you to configure a business process to behave differently in certain situations.
The rules use logical statements connected to data in Workday to determine when an event meets
the specified criteria.
Entry conditions
Validation conditions
Exit conditions
Type
Identifies the type of step (e.g., Action, Service, or To Do). See the next section for more detail on
available step types.
Group
Identifies the security group(s) responsible for the step. The business process security policy lists the
allowed security groups for each step.
A step in a business process is either a task, a subprocess, or other action that either a user in a
security group or the Workday system must complete during a business process event.
Take a look at each section below to learn more about the different business process step types.
Initiation
Defines who can start the business process. It is always the first step in a business process and
cannot be removed.
Action
Prompts a user to review (and edit) the event's data or initiates a subprocess.
Approval
Gives the assigned user the opportunity to approve, send back, or deny the entire business process.
Approval step recipients cannot edit any information.
To Do
Sends an Inbox task to the assigned workers with instructions for a task inside or outside the
Workday system.
Service
Starts a separate processing thread for a Workday-delivered service (e.g., the creation of a Workday
user account).
Integration
Triggers a Workday system operation that transfers data to or from an external application. An
Integration step also initiates a separate processing thread.
Reporting & Analytics
With transactions completed in the same system as reporting, the data is always accurate and up-to-
date. The configurable security model applied across the entire system ensures the right people
have access to the right information, including report data. And organizations and worktags provide
a variety of business dimensions to filter and analyze data.
Having all of this in one place provides a reliable single source of truth and makes Workday a
valuable tool for organizations to plan, execute, and analyze their business goals.
Workday delivers standard reports that are available for all customers. If necessary, you can copy
many of the Workday-delivered reports to create a custom report and modify it as needed.
Workday Report Writer lets you create custom reports to meet your business requirements. You
may start with an existing report or you may create your own reports from scratch. Either way, the
reports will adhere to your security configuration.
Below is an example of a custom report.
Advanced
Advanced reports allow you to display data from the primary and related business objects. These
reports are shareable. You can sort and filter the data, show groupings, and display sub and grand
totals. You can also add charts and enable the report as a worklet or web service.
Matrix reports allow you to group data, summarize the metrics for each grouping, and drill into the
summarizations for further analysis. In addition, matrix reports also provide for filtering, charts,
worklets, and report sharing.
Composite reports enable you to combine data from multiple data sources into a single report by
using advanced or matrix subreports.
Trending reports enable you to report on and analyze trends in worker data, such as headcount and
attrition over a period of time.
Advanced reports are the most common type of custom report. Below is an advanced custom report
definition. To learn more about the different configuration options, see the image below and the
following explanations of the highlighted sections.
Data Source
When creating a custom report, the most important decision is selecting your data source. The data
source drives the primary business object and view of the data. Data sources provide the starting
filter for your report.
Workday defines and delivers one or more data sources for most business objects.
Columns
Select the fields to include on the report and specify their sequence. The columns grid contains one
row for each column. In each row, define the business object, field, column heading overrides, and
options for how the field should display.
Note: You can only add fields that you have security access to.
Sort
You can also specify options for displaying subtotals, grand totals, and outlines.
Filter
Prompts
You can further narrow and refine your report results by having the user complete prompt fields
before they run the report. Specify prompt-related data about your report. You can set default
values for prompts, so users do not have to enter values when running a report. You can also hide
prompts that have default values, so users do not see them at run time.
Output
Override the default output options, including output type, worklet options, and help text. By
default, a custom report renders as a table. You can change this to display the report as a chart,
chart and table, or gauge.
Share
Share the report with other users or groups. By default, only the report owner can see a custom
report. You can only share a report with users who have access to the report data source. Sharing a
report allows other users to run and copy the report.
Advanced
Defines additional report options. Some include enabling save parameters, enabling a report as a
web service, enabling a report for Worksheets, or changing the expiration information for temporary
reports.
Business Object
Advanced reports allow you to display data from the primary and related business objects. The
business object you select here determines the fields that are available in the Field column.
Field
Each business object has many Class Report Fields (CRFs). In the Field column, specify the field from
the business object to display in the report.
While the core Workday product areas satisfy most general business needs, not all businesses that
run on Workday purchase all of these products. They may need to integrate Workday with third-
party systems, such as external payroll systems.
Additionally, some businesses may want to add their own custom functionality to Workday.
Platform and Product Extensions integrate, connect, extend, and securely tailor Workday to meet
these nuanced business needs.
In the following lessons, you will learn about two platform and product extensions:
Workday Extend
An integration allows data to pass between Workday applications and external systems. An
integration system provides the methodology for communicating data.
Integration Tools
Workday provides a variety of tools to integrate data with external systems. View the list below to
learn more about each tool.
EIBs enable you to use a spreadsheet template to input or output Workday data files one at a time
using one web service, one transformation, and one endpoint.
Example: Use an EIB to input annual bonus data for all workers. To do so, create an inbound EIB,
generate its prebuilt spreadsheet template, enter the data, and upload it back to Workday.
The image below shows an inbound EIB for annual bonuses on the Create EIB task.
Cloud Connect
Cloud Connect, or connector integration systems, are integration templates that allow for
configuration but use mostly prebuilt functionality. Connectors do not require you to interact
directly with web services or reports to source the data; instead, they rely on the integration
template and its configured integration services.
There are two types of connectors: end-to-end connectors and generic connectors.
Generic connectors generate a specific category of Workday data, such as payroll or job
position data.
Document Transformation
Document transformation integration systems modify input or output files for connectors.
Document transformation has basic error message and warning functionality.
To use document transformation, you create an XSLT attachment that modifies the connector's XML
file as needed.
The image below shows the Create Integration System task using the Document Transformation
template.
Workday Studio
Workday Studio is an Eclipse™-based integrated development environment (IDE) that enables you
to:
Workday Studio is the most complex and customizable integration tool you can use for Workday
integrations. Though Workday maintains and updates Workday Studio, it is its own desktop
application.
Businesses choose Workday Studio for integrations with multiple data sources, complex error
handling, large datasets, conditional logic, or sophisticated change detection.
Workday Extend is a tool to build apps that run inside the Workday cloud. Extend apps have a
consistent user interface (UI) with Workday, can access Workday data seamlessly, and fit within the
same security framework, allowing businesses the same flexibility with user access.
The following image shows that Workday Extend allows businesses to:
The demonstration below follows the creation of a custom employee recognition app. You may
know that adding worker feedback is native functionality of Workday. So, why create your own app
instead of using the native feedback functionality? In our example, the native Workday feedback app
does not allow the worker to be awarded a monetary gift for positive feedback. We will build a
custom app to provide that feature.
The process steps below follow the creation of an employee recognition app. Managers can enter
positive feedback for an employee and also provide a one-time monetary award.
Use metadata to create Extend apps. Workday internally compiles this data, resulting in the running
app that users interact with in Workday.
Developers use JavaScript Object Notation (JSON) to create pages, custom objects, or tasks.
The image below shows metadata and the resulting app page in Workday.
Task 2: Embed Workday Security into the App
Because Extend apps conform to the Workday security framework, developers need to create
domains and security groups so that users can access the app.
The image below shows the metadata behind creating a security domain and the domain as it
appears in Workday.
How does the data get from the app back into Workday? Workday Extend finds data and brings it
back to the Extend app using a type of API called a REST (Representational State Transfer) API.
APIs (Application Programming Interfaces) allow two applications to communicate. Each time you
use an app to check the weather, for example, your device is retrieving the information using an API.
The image on the left shows the metadata for an API operation being executed via an outbound
endpoint. The image on the right shows the REST API Explorer, which documents REST APIs by
functional area.
Task 4: Deploy App to a Tenant
To deploy the app, developers sign in to both the developer site and their development tenant.
Developers need to sign in to the developer site because it provides access to the Extend AppHub.
The AppHub is a central location where all a developer's app code exists.
As shown in the image below, a status popup appears during deployment. Once the deployment is
complete, the popup displays a URL to test the app.
Task 5: Test App
After deployment, developers can test the Extend app by opening Workday on their development
tenant and entering the name of the custom task in the Search bar.
Enable employees to donate to charities with one-time and recurring payroll deductions.
Note: None of the above apps are part of the core Workday app. However, Workday Extend allows
you to create the apps your company needs.
Workday Adaptive Planning is a cloud-based planning and analysis application. It allows you to:
Apply the results of your plans back into financial statements, providing visibility into the
true impacts of your plans.
This means businesses can accurately model scenarios, monitor performance, analyze current and
past performance, and report on data.
While Adaptive Planning centers on financial planning, it also supports workforce and sales planning.
Note: Workday Adaptive Planning is a separate application from the core Workday application.
Accounts
Accounts are containers that group actuals or planning information, such as income, expenses,
assets, liabilities, sales, and any business metrics. You can use sheets and reports to view and edit
this data.
Time
Time lets you view and configure the time period structure for your model. There is one default
calendar and up to three alternate calendars.
Sheets serve as the interface for financial managers and planners to enter, store, display, and
analyze data. This can include actual ledger data, forecasts, personnel information, and budgets.
When you save a sheet, you update the data stored on the server.
Reporting & Analytics combines real-time analytics with integrated transactional data to support
enterprise planning.
Create dashboards for self-service, interactive visualizations, and charts to monitor and drive
business performance.
You can view planning data on reports, which allow several ways to view, filter, and sort the data.
As shown in the report image below, users select a version and choose a level. Green values indicate
actuals data, while black values indicate plan data. Only some fields are editable. Fields in gray are
accounts that contain formulas. The rows also represent accounts.
Levels
Levels are the organizational structures of a business. Levels represent companies, departments,
cost centers, profit centers, or geographical regions. An organization structure models the
operations of a business and the way data rolls up for planning and analysis.
For example, department values can roll up to the country level, and country values can roll up to
the company level.
Levels allow administrators to control data visibility. For example, managers in the United Kingdom
can only view data for levels related to the United Kingdom. They cannot view data related to levels
in the United States.
The image below displays levels for a university. Cost centers for each department roll up into
academic affairs, which rolls up into the cost center hierarchy, which then rolls up into the
university.
Dimensions
A dimension is a logical category with a list of values. For example, a dimension called Region might
have values of North, South, East, and West. You use dimensions to input data and to create
hierarchies that are independent of the level structure.
You can use dimensions to tag data and view it in different groupings, for example headcount by job
status, sales by product, or expenses by project.
Attributes
Attributes are logical groupings with lists of possible values. You can use attributes to tag accounts,
dimensions, and levels. For example, you could create attributes to represent different roll-up
hierarchies for your organization, including geographical hierarchies and functional hierarchies.
Versions
A three-year plan.
The image below highlights a version representing the final budget for 2022.
In the next section, you'll learn how to navigate Workday Adaptive Planning.
Workday Peakon Employee Voice
What is Peakon?
Peakon is an intelligent listening platform that converts confidential employee feedback into insights
that leaders can use to help create more responsive, fulfilling, and productive workplaces.
Employees can instantly and confidentially share their thoughts, concerns, and ideas with their
organization's leadership using a survey format.
First, you receive a survey link via email, text message, Slack, Microsoft Teams, the Workday mobile
app, or a Kiosk login code. This survey will include questions, a scale to answer the questions, and a
place to enter comments. Keep in mind that all responses are entirely confidential. No one in the
organization can identify who has provided any particular answer or feedback, including coworkers
and leaders.
Take a look at the information below to learn more about questions, the scale, and comments.
Questions
Survey questions may include topics such as employee engagement, transformation and change,
health and wellbeing, and diversity and inclusion.
Scale
As shown in the image below, questions have a 0 to 10 scale, for you to rate how strongly you agree
with the statement that describes your experience at work.
If you are unsure how to answer a question, it is best to skip it using the Skip question button. For
example, you may choose to skip a question when you are new to a role and are unsure how it
applies, or if the question does not relate to your role.
Comments
Once you have rated a question from 0 to 10, you have the option to elaborate on your experience
or leave suggestions in the Comments box shown in the image below. We highly recommend adding
comments, whenever possible. Comments provide more insight to your leader on how and where to
improve.
Processing the Feedback
Feedback is aggregated on the leader's dashboard, which displays priorities and strengths to indicate
what drives job satisfaction in their team, as well as areas where improvement may be necessary.
Depending on access controls, leaders may initiate conversations by reacting to survey comments.
They may also send acknowledgments via email to let you know they have received your feedback
and share any next steps.
Remember, you remain anonymous throughout the entire process. Even if you reply to a
conversation or receive a comment, your responses remain confidential.
Prism Analytics Overview
Workday Prism Analytics provides executives and managers with a full picture of their business with
analytics in Workday using any source of data.
Prism Analytics is a data hub that enables you to blend Workday data with high volumes of non-
Workday data to uncover new insights in your Workday reports, dashboards, and discovery boards.
It provides the ability to ingest, blend, and transform Workday data with external data and publish
the output as a new Prism data source.
Extended Ecosystem
Includes pulling in data from subsidiary, contract labor, or third-party Finance and HR applications.
Example: Data from contingent labor, time tracking, survey, planning, financial, or stock vesting.
Workday also uses Prism to power applications like People Analytics and Accounting Center.
Operational Insights
Includes data from third-party, industry, or home-grown applications for company-specific decision
support on topics as wide ranging as capacity planning, sales performance, and deep profitability
analysis.
Example: Policies and claims data for insurance, point-of-sale data for hospitality, and loan data for
banks.
History
Enables long-term historical trends by bringing in data from legacy applications such as PeopleSoft,
ADP, SAP, or Oracle's E-Business Suite.
Example: People and financial history. Once you have the data you need from your legacy systems,
you can retire them to reduce costs.
Business Case
Review the Prism process flow as we work through the following business case:
The music department at Workday University will be holding a fundraiser. Current students working
a call center will reach out to former alumni from the program. Based on the results of those calls,
they will then send out invitations to an alumni donor event. Alumni data is housed in an external
tool called AlumniBase. We need to report on the external alumni data from AlumniBase to assist
the students' efforts in the call center to reach out to alumni. They can do this using Prism Analytics.
To ingest data into Prism Analytics, you start with the data catalog, shown in the image below. Here
you can create, edit, and view Prism entities like tables, datasets, and data change tasks.
Process Flow 2: Acquire Data - Table Data
A key Prism entity is the table. You can create tables, or schemas, based on four techniques:
Parsing an uploaded file with the data extracted from an external system. You can upload
these files directly, using SFTP or a REST API.
The image below shows a comma-separated values file or CSV file. We extracted this data from
AlumniBase, the external database that holds alumni information. Although we used the CSV file
format, there are other types of data that you can import.
Process Flow 3: Acquire Data - Table Creation Options
You create new tables using the data catalog. In the steps of the Create Table task shown above, you
first enter the table details. Then, you specify how you want to create the table. In our case, we are
directly uploading the file. Once you make your selections, you can create the table.
When creating a table, Prism displays a preview of the imported data. There are many different
formatting options available, like whether you want to use:
A data change task allows you to change or refresh the data in a table. You can save and reuse date
change tasks to edit and rerun at any time. Using data change tasks, you can:
Insert unique rows and update existing rows in the same activity. This is called an upsert
operation.
Note: You publish data as datasets not tables. Recall the stated goal is to create new data sources in
Workday to enhance your displays and reporting by using data that is external to Workday.
Process Flow 5: Acquire Data - Create a Derived Dataset
Once you have a table, you can create a derived dataset from the table as shown in the image
below. Derived datasets will blend and transform existing datasets and tables into one final dataset
for publishing. The number of derived datasets you need mainly depends on the degree of
modularity and reuse required, as well as the complexity for maintenance, testing, and
troubleshooting.
When you add a stage, you are defining how you want to manipulate the data with options like:
Filters
Group By
Joins
Example: If you wanted to limit your data to alumni in a specific state, you could add a Filter stage. If
you wanted to get a count of alumni by state, you could use the Group By stage.
Process Flow 7: Transform Data - Stages
The first stage in a pipeline brings in data from a source. Stages occurring after the first stage in a
pipeline, take the output of the earlier pipeline as the input to the current stage. Each stage is one
step in a development pipeline. The last stage of any pipeline is the output for that pipeline for the
entire dataset.
Therefore, when you publish a dataset, the output of the primary pipeline materializes as the data in
the Prism data source. An example of a stage is shown in the image below.
Process Flow 8: Publish Data
After performing the needed transformations, you are ready to publish the dataset. There is a Quick
Action pull-down for publishing, as shown in the first image below. Once you publish the dataset,
Workday will show you the status of the publish operation, as shown in the second image below.
Workday creates a data source for reporting when a dataset is published.
You can use Prism data sources like any other Workday data source and build reports using Report
Writer or Discovery Boards.
Using Report Writer, you can create simple, advanced, transposed, and matrix report types using
Prism data sources.
The first image below is an example of building a custom report. Notice that we selected our
AlumniDataDS as the data source for the report. This confirms successful publishing of the Prism
dataset. Review the report in the second image below.
Process Flow 10: Report on Prism Data - Additional Reporting Options
You can also create discovery board visualizations using Prism data sources. There are many
visualization types, such as heat maps, pivot tables, and line charts.
Additionally, you can create calculated fields on the Prism business object, but it does not support all
calculated field functions.
Putting it All Together
You should now have a better idea of how Workday Prism Analytics enhances the data experience in
Workday. Review the graphic below that summarizes the Prism process.
Up next, we will review organization types in Workday and then further explore two specific types of
organizations: companies and locations.
Companies in Workday
Companies are organizations in Workday that represent the internal business entities within an
enterprise. For each company created in Workday, you can record business transactions, produce
financial statements, and create statutory reports.
Currency
You have the option to specify a base currency for each company. Doing so enables you to use
multiple currencies across your Workday deployment.
What is a Location?
In Workday, locations are organizations that extend your ability to manage and report on business
facilities, equipment, and the workers who use them. Each company you create resides in a specific
location. You can set up location usages and identify location assets. For example:
Take a look at the list below to learn more about the characteristics of locations.
Physical Address
Locations always include a physical address. You can also include details like an email address or
phone number.
You can set up postal code validations to validate or require codes. You can also set country-specific
postal codes validations.
Time Profile
A location's time profile defines the standard number of hours worked in that location each week.
Locale
A location's locale controls the format for the date, time, and currency. If you specify a locale for a
location, workers in that location inherit the locale.
Use Cases
Locations are versatile and the use cases for locations vary depending on the products configured in
the tenant. Read through the use cases below to review how businesses use locations with various
Workday products.
You need to provide different onboarding documents for employees in different locations. You can
use locations as a criteria in a business process condition rule to target specific locations.
Recall that some business process definition steps have Workday-delivered entry conditions that you
cannot edit. However, you can specify additional entry conditions for these steps, and Workday will
evaluate the conditions when the business process runs. Keep in mind that Workday will skip any
step that does not satisfy all the entry conditions.
Use Case 2: Financials
Set up locations for geographical financial reporting if physical locations align with financial
reporting requirements.
Configure storage locations for shipping goods and services for procurement.
Define a global location hierarchy to group locations like city, state, country, and continent.
You can use locations to restrict schedules and wages based on local regulations.
Recruiters to access reports and tasks for candidates and available jobs based on city, region,
and country.
To report on all locations in a region, you can configure the region as the location hierarchy instead
of selecting individual locations.
You have HR partners assigned by superior organization, but there are workers in different countries
within the same organization. You can create separate local HR partner roles and assign them to
each location hierarchy based on country. Then you can assign security based on the intersection of
the groups so that the HR partner only has access to data for the workers they support.
You can:
Enable instructors to select classrooms based on attributes like physical location, capacity,
ADA compliance, and equipment.
In the demonstration in the next section, we'll show you how to create a location in Workday.
Location Hierarchies
A location hierarchy is an ordered structure of locations. Workday automatically includes workers as
members of location hierarchies when the hierarchy includes the location of their position. Like
locations, location hierarchies are geographic attributes of Workday objects that make reporting on
locations and the objects assigned to them easier. For example, you can:
Build condition rules based on location hierarchy to improve efficiency and reduce
maintenance.
As displayed in the graphic below, you can create a location hierarchy for California and configure
San Francisco, Los Angeles, and San Diego as subordinate locations. The California location hierarchy
is a subordinate location of the Western U.S. location hierarchy.
Example: Workspaces
Workspaces are specific locations, such as a desk, office, or cubicle, related to each worker's
position. You can create workspaces as part of a location hierarchy. A workspace must be
subordinate to another location within a location hierarchy.
Workday Configurable Security
In the Workday Basics course, you learned about the Workday configurable security framework at a
high level and explored user-based and role-based security groups.
Recall that a user gains access to a secured item through belonging to a security group which has
permissions to a domain or business process containing the item.
Take a look at the information below to learn how a user gains access to the Create Benefit Plan task,
which is a securable item.
Domain
Domains are collections of items that share the same security (e.g., tasks, delivered reports, report
data sources, web service operations).
Workday determines the secured items within each domain, and a given item may be in more than
one domain.
Example: The Benefits domain houses the Set Up: Benefits security policy.
Security Policy
To access a given secured item, a user must be a member of a security group with permissions to a
domain or business process security policy containing the item.
Domain Security Policies: Allow you to configure which security groups can access the items
in a domain. You can also determine what type of access each security group has to those
items (e.g., view-only vs. modify permission).
Business Process Security Policies: Allow you to configure who can do certain types of
actions for a business process type (e.g., initiate the BP or approve steps in the BP).
Example: The Benefits Administrator security group has both view and modify permissions to
reports and tasks for the Set Up: Benefits domain security policy.
Security Group
Users gain access to secured items through membership in security groups, rather than as individual
users.
A security group allows you to grant Workday access to a collection of system users who need
similar access.
Example: Users, such as benefits administrators, belong to the Benefits Administrator security
group.
Secured Item
Items are what users can view or do in Workday, such as reports and tasks. Workday groups secured
items into domains and business process types, which belong to security policies.
For a user to gain access to a secured item, the user needs to belong to a security group which has
permissions to a domain or business process containing the item.
Example: The Create Benefit Plan task is a secured item in the Set Up: Benefits security policy. Users
need modify permissions to access this task, so only members of the Benefits Administrator and
Implementers security groups can access it.
By configuring a security group in a domain or business process security policy, members can access
the secured items in those policies, such as reports, tasks, or events. However, some security group
types can enforce constraints on what target instances of data members can access.
Self-service groups grant members access to only their own instance of data. This means
they can only view data directly related to them.
Constrained security groups grant members access to a subset of data when accessing a
securable item. What target instances users can access typically depends on the
organizations they belong to.
Unconstrained security groups grant users access to all target instances of a securable item.
Take a look at the image below and its following information to learn how members of these types
of security groups gain access to different target instances of data on the Total Rewards report.
Chaaya Basu
Chaaya is a member of the Employee As Self self-service security group with access to the Total
Rewards report.
Due to the constraints of this type of security group, she can only run the report for her own
instance of data. Chaaya cannot run the report for other workers.
Jared Ellis
Chaaya's manager, Jared, is a member of the Manager role-based constrained security group and the
Employee As Self group.
The Manager security group can access the Worker Data: Total Rewards domain, which gives Jared
the ability to run the Total Rewards report for his team, as well as for himself.
Logan McNeil
Because of her unconstrained access, Logan can run the Total Rewards report for any worker.
You should now have a firmer understanding of how the Workday configurable security framework
allows users to gain access to data.
For each location you create, you can create a location membership security group that holds all
workers in that location. For example, you can create a group for all workers in Dallas or all Canadian
home office workers.
Once you create a security group for a location, Workday automatically adds all workers based in
that location to the security group. However, this does not automatically grant those workers any
security access. You need to give the security group permissions to domain security policies.
Use Cases
Take a look at the information below to learn about possible use cases for location membership
security groups.
Workers in the U.S. based at their home office can access a work-from-home stipend to purchase
office equipment.
Dallas workers
Workers based in Dallas can view and participate in giving and doing events in Dallas.
Japan workers
Workers based in Japan can create and take on gigs (temporary projects) in Japan.
Note: Location membership security groups are unconstrained. This means that Workday does not
match worker location to the location of the secured item.Let’s say you create a security group for
all workers in Japan, and you grant this security group permission to view sales reports. Without
additional configuration, members will be able to view reports with data for all countries, not only
Japan.
Just as location membership security groups hold all workers based in a certain location,
organization membership security groups hold all workers who belong to a certain organization.
You can create an organization membership security group for workers in any organization type
except location, which has its own security group type (location membership). For example, you can
create a security group for all members of a pay group, company, supervisory organization, or cost
center.
Organization membership security groups can be either constrained or unconstrained. Recall that:
Constrained security groups grant members access to a subset of data when accessing a
securable item.
Unconstrained security groups grant users access to all target instances of a securable item.
Constrained organization membership security groups grant members access to target data only for
the organizations to which they belong.
For example, Workday University could use a constrained organization membership group to grant
security access to all HR partners in the Human Resources organization. Then, they could constrain
the HR partners to target data related to only the organizations they support. In this way, the HR
partner who supports IT HelpDesk can only access HR-related data for IT HelpDesk employees.
Unconstrained Organization Membership
Unconstrained organization membership security groups grant members security access to any
target data in the system.
For example, Workday University could use this security group type to grant members of the
executive management group access to all financial data in the system.
Job-Based Security
Job-based security groups identify workers in a specific job criterion. Group criteria options include:
Constrained job-based security groups identify workers in a given job criterion and grant members
access to target data only for the organizations to which they belong.
For example, Workday University could use a constrained job-based security group to identify deans
based on management level. Then, they could constrain them to target data in the school they
manage (e.g., Workday University School of Law).
For example, Workday University could use an unconstrained job-based security group (Workers in
IT) to grant security access to workers in any of the IT-related job families. Target data may include
reports that index worker computer models and software permissions.
Business Case
IT HelpDesk employees sometimes need to answer support calls during off-hours. For this reason,
Workday University is going to provide a cell phone allowance, but only wants IT HelpDesk
specialists to have access to this item when creating expense reports.
In the following demonstration, we will create a job-based security group for workers with the job
profile of IT HelpDesk Specialist to use for this purpose. We will also review the various configuration
options.
Putting It All Together
In Workday Basics, you learned that the Workday configurable security framework allows businesses
to control what a user can access and do in Workday. A user gains access to a securable item
through membership in a security group, which has permissions to a domain or business process
containing the item.
In this section you learned that constrained security groups grant members access to a sub-set of
data when accessing a securable item. And unconstrained security groups grant users access to all
target instances of a securable item. You also learned about three additional security group types:
Location membership, which group workers who are based in a specific location.
Job-based, which group workers based on management level, job category, job family, or job
profile.
In the next section, you will review business processes and learn about routing restrictions and
delegation.
Workday Business Processes (BPs) are the cornerstone of many applications. BPs route tasks to
authorized users based on their membership in security groups and organization hierarchy.
Routing restrictions enable you to configure business process steps so that Workday excludes
selected individuals from the workflow routing based on your selections. Using advanced routing
allows you to secure and streamline business processes. Refer to the image below and the following
definitions to learn more about the options available with advanced routing restrictions.
Routing Restrictions
Routing restrictions secure and streamline business processes by further controlling who interacts
with a business process.
Exclude Initiator
Excludes the worker who initiated the event.
Example: If the supplier administrator creates a supplier request, it should not be sent to them for
approval.
Excludes any workers who previously approved any step of the process.
Example: If a worker already approved compensation details for a new hire, they do not need to
additionally approve the entire hire event.
Example: If the HR partner is terminated, they should not review their own termination.
Alternate Routing
Alternate routing allows you to designate an alternate security group to complete the step instead.
Example: Select the manager of the worker who is the event subject.
Require interaction from only one user per security group, if you required multiple security groups to
interact with it.
Business Case
The HR Partner for IT HelpDesk is retiring. To ensure this individual will not perform the tasks for
their own termination, in the following demonstration, we will configure an advanced routing
restriction as we review the Termination business process workflow.
Delegation
What is Delegation?
Delegation temporarily assigns your tasks to another worker, enabling that worker to perform
individual actions on your behalf. A delegate can only access tasks that you delegate, in addition to
any tasks specified in the delegation configuration.
You configure delegations on the Manage Delegations task. Refer to the image below and the
following definitions to learn more about the fields on the Manage Delegations task.
Begin Date and End Date
Delegation begins and ends based on the time zone of the delegator. These fields may be required
depending on tenant configuration.
Delegate
Select the worker you want to delegate the tasks to. If necessary, you can configure the tenant to
restrict the delegates available in this prompt.
Start on My Behalf
This prompt is only for delegating the initiating action of a business process, not for delegating Inbox
tasks.
Select whether to delegate Inbox tasks for all business processes, or a specific business process. Or
you can also select None of the Above to remove the ability to do Inbox tasks while retaining the
ability to initiate a specific business process.
Typically selected by default when selections are made in the For all Business Processes or For
Business Process fields above. If selected, both you or the delegate can complete the tasks.
Clear this checkbox if you do not want to get notifications and access the tasks from your own Inbox.
Delegation Rule
Optionally, you can apply delegation rules to the business processes selected above. Delegation
rules relevant to the business processes will display in the prompt.
Connect
Make it easy to connect people, applications, and services by enabling set-up process flows.
Easy Configuration
Enable administrators to configure all aspects of BPs without the help of IT staff.
Save Time
Third-Party Applications
Ensure that leaders have access to the latest data by integrating third-party applications.
Audits
Notifications
Security
Use BP security policies to determine who can participate and what actions they can perform.
In Workday Basics, you learned that when you need to complete a business objective in Workday,
you use a business process or workflow. A business process has steps that, when placed in a specific
order, determine the actions to take and the security groups that must perform them. In the
following lesson, the video will refresh your understanding of business processes and learn about
two specific features of business processes: advanced routing restrictions and delegations.
In Workday Basics, you learned that Workday provides a powerful and user-friendly real-time
reporting tool. Reporting in Workday allows businesses to plan, execute, and analyze their goals.
In this section, you will review the reporting framework and then learn about sharing, scheduling,
and exporting reports.
Standard Reports
Workday delivers standard reports that are available for all customers. If necessary, you can copy
many of the Workday-delivered reports to create a custom report and modify it as needed.
Customers can use the Workday Standard Reports report to look up all standard reports in a certain
category. For example, as shown in the image below, the Expenses report category includes the
following standard reports:
Average Expense Cycle Times: This report details the average expense processing times for
approval and payment in days by cost center.
Average Expense Report Total: This report details the average total expense amount for
approved expense reports by cost center.
Credit Card Personal Charges: This report lists expense report lines or line itemizations that
are credit card charges and identified as a personal expense.
Custom Reports
Workday Report Writer allows you to create custom reports to meet your business requirements.
You can start with an existing report, or you can create your own reports from scratch.
Recall that Workday stores data in business objects, similar to database tables or worksheets in
Excel. Just as a database table or worksheet has columns and rows, a Workday business object has
fields and instances.
The report data source provides the view into the primary business object. This object gives you
access to class report fields as well as links to related business objects.
The image below provides examples of these business objects and data sources.
Report Security
Recall that a security group gets access to a security domain, which is a predefined set of related
securable items. Securable items can include reports, tasks, data sources, and report fields. Both
standard and custom reports adhere to the Workday configurable security framework.
Review the table below for examples of security access for report-related securable items.
Permitted Security
Securable Item Security Domain Impact
Groups
Accountant
Accounting
Standard Report: Find Manager Members of these security groups can run t
Process: Journals
Journal Lines standard report.
Finance Auditor
Implementers
Manager
Task: Create Custom Report Writer Members of these security groups can creat
Custom Report Creation
Report Setup Administrator reports.
Implementers
Payroll
Administrator
Data Source: All Set Up: Payroll Members of these security groups can creat
Customer-Owned (Calculations - Payroll Payroll Partner reports that use this data source (assuming
Deductions Specific) Payroll Auditor report is shared with them).
Implementers
Accountant
Report Field: Billing Billing Specialist Members of these security groups can acce
Process: Billing
Schedule Cash Manager report field and create reports with it.
Implementers
Report Definitions
A report definition is the object in Workday that organizes the data sources and filter options that
you use to produce a specific report. When you run a report, Workday pulls data from the data
sources and creates a report with specific instances of that data. For example, the report definition
might designate the data source of Worker. Then, when you run the report, it displays individual
worker names (e.g. Logan McNeil, Jack Taylor).
By default, a custom report definition is visible only to its owner and to users who have access to
manage all custom reports. Workday does not automatically share custom report definitions. For
each report, you can determine the groups and users to share it with.
The domain securing the custom report's data source determines which security groups you can
share the custom report with.
As shown in the image below, the Share tab on a custom report allows you to share the report
definition with authorized users. Any changes you make to the report are immediately visible to all
shared users.
You can share a custom report with either all users or specific groups and users who have access to
the report data source and data source filter.
Example
The Employee Audit by Organization custom report allows shared users to view sensitive worker
data, such as base salary, hire date, social security number, age, and emergency contacts. However,
those users can only view data in the report for which they have security access. The report owner,
Logan McNeil, has shared this report definition with users who have the job profile of Manager.
Logan McNeil is the owner of the Employee Audit by Organization custom report. She is also a user
with security access to all data sources and report fields for the report.
For her organization, Global Modern Services, Inc. (USA), she can view the following fields for all
workers:
Employee
Supervisory Organization
Hire Date
Age
Emergency Contacts
Jack Taylor's Access
Jack Taylor is a manager and therefore has the security access to run the report. However, he does
not have access to all the data sources and report fields. He can only view some of the fields for
himself, and an even smaller subset of fields for the employees he manages. For example, he cannot
view personal data like Social Security Number, age, or emergency contacts.
Note: When you share a report definition, users can view and run the report but cannot edit it. Only
the report owner, and those who can manage all custom reports, can edit custom reports.
Additionally, a shared user can copy the report definition, if that user is also a member of the report
writer security group.
Exporting Reports
Several options are available for exporting reports, for example Excel files or PDFs.
For advanced report types, there are more available export options. For example, you can enable a
report for Worksheets. You can also enable web service, which allows you to use the custom report
in an outbound integration. It also makes the report available to Prism Analytics.
When you edit an advanced report, the Advanced tab allows you to enable the report as a web
service, enable for Worksheets, and enable for Prism.
The image below shows the Advanced tab for the Worker Expense Reports custom report from the
previous lesson, which is enabled as a web service.
What's Next
Congratulations on passing the exam and completing the course content. Before you are done with
the course, review additional information included in this section. Below you will find job search tips
depending on the type of role you are interested in exploring.
When you work for a Workday customer, you get to become an expert in their specific business,
industry, and requirements. You can evaluate the features of each release to find out if they are a
good fit for your organization and become the go-to Workday expert.
You can view our customer list and filter by industry here. Note that not all customers are listed, so a
search on a job posting site will provide the most options!
Review the information below to learn about potential careers with Workday customers.
Business Analyst
If you are interested in configuration and deploying new features, you will search for business
analyst roles. However, the job title might vary depending on the company, the industry, and the
functional area.
For example, a business analyst focused on Workday HCM might have the job title of HRIS Analyst or
HCM Analyst. Or a business analyst focused on Workday Financial Management might have the title
of Financial Systems Analyst.
There are different focus areas for business analysts, depending on your specific interests:
Functional analysts are responsible for configuring business process workflows, security,
reporting, and analytics.
Technical analysts are responsible for building and maintaining integrations, assisting with
complex reports, and managing the broader system landscape.
To make sure you can view all available opportunities on job posting sites, it is safest to search for
the keywords: "Workday analyst".
Business Partner
If you are more interested in a functional role that uses Workday for transactions, you will search for
business partner or business user roles.
Again, the titles for these types of roles will vary by functional area. For example, in Human
Resources, this role is usually called HR Business Partner. In Finance, it could be a Financial Analyst
or Accountant.
If you know which functional role you're interested in, just add Workday into your job search to find
job postings from Workday customers. They will typically list Workday somewhere in the job posting.
Program Manager
Workday program managers are responsible for managing the budget and resources for day-to-day
maintenance, as well as optimization and enhancement initiatives.
Deployment time frames vary by customer size and complexity, as do project team sizes. So,
consultants are always working on something new, often with new people, and figuring out how
their customer can make the most of the Workday system.
There are different types of deployment consultants, depending on your experience and area of
interest. Expand each section below to learn about potential careers with Workday partners.
Functional Consultant
Data conversion consultants migrate data from the customer's previous legacy system into Workday.
If you love tools like Microsoft Excel and MySQL, this could be the role for you!
Integration Consultant
Integration consultants design and build integrations with other systems. Integration consultants
become experts in various Workday integration and reporting tools and work with external vendors
to create and maintain connections to keep data up to date in both places.
For example, in this role, you might build an integration to support single sign-on (SSO), benefit
elections, or tax filings–just to name a few.
Project Manager
Project managers and engagement managers work closely with the customer's program
management team and stakeholders to organize resources and deliverables for a deployment.
Experience Levels
Review the experience (seniority) levels in this industry, starting from least amount of prior
experience needed to most, below.
1. Associate
2. Senior Associate
3. Staff
4. Senior
5. Principal
There are lots of other types of roles to explore. For example, the Workmates who created this
course are instructional designers, eLearning developers, content editors, and video editors.
Customer Operations
Product Management
Sales
UX and Design
Check out our career site to learn more about our teams, our culture, employee benefits, and to
search open positions!
Workday also offers training, internships, and job opportunities for nontraditional candidates, like
veterans, caregivers, and young adults. Learn about our Opportunity Onramps programs here.
Workday Education
If you join the Workday ecosystem, we look forward to meeting you in one of our Workday
Education offerings!
Workday Education helps customers and members of the Workday ecosystem deploy and best use
their Workday applications. Our training ranges from strategic topics, such as learning to deploy
Workday at a company site, to specific information about new features in the latest Workday
release.
We offer a variety of learning delivery options from independent, self-paced offerings to high-end,
interactive activities in the Workday tenant. We also offer customer accreditations and partner
certifications. You can learn more at Workday.com.