Chapter 3: Security Flashcards

(84 cards)

1
Q

A user must have access to what to access secured content?

A

Domain or bp security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Domain?

A

Collection of items that share the same security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a business process represent in Workday?

A

Events or transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define secured content

A

Individual data instances such as worker, social security #, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can you change domain and bp types in each functional area?

A

No, instead create security groups & configure membership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What must be done before you can access a certain functional area?

A

Enable through ‘Maintain Functional Area’ task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define System Users

A

Individual users are added to security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Security Groups

A

Determines what kind of access a user has - tie to a role or directly to specific user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two types of security policies?

A

Domain & business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security groups can have what type of access to domain security policies?

A

View or modify access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security groups can have what type of access to bp security policies?

A

Access to different steps in the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What report do you run to see domain security policies?

A

Domain Security Policies for Functional Area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are securable actions?

A

Items such as delivered reports & tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are securable reporting items?

A

Items needed for custom reporting (i.e. data sources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you edit domain security policies?

A

Related Actions on domain security policy > Domain Security Policy > Edit Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What report do you run to see bp security policies?

A

Business Process Policies for Functional Area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the difference between domain and bp security policies?

A

Domain gives you access to securable content, bp lists who can take action on certain bp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do you make changes to a bp security policies?

A

Search for bp policy using ‘Business Process Security Policies for Functional Area’, scroll down and click ‘Edit Permissions’ button

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What task needs to be completed before security policy change can take place?

A

Activate Pending Security Policy Changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Override Parent Permissions?

A

If child domain requires different permissions, you can override so it won’t inherit parent permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What report should be used to determine how Workday secures a delivered item?

A

View Security for Securable Item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What report should you use if you need to know how a certain user has access to securable item?

A

Security Analysis for Securable Item and Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How are integration permissions different from report/task permissions?

A

You can configure two levels of security group permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define Get

A

Provides access to extract data from Workday via web service operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Define Put
Provides access to both extract and load data into Workday via web service operation
26
What are the 3 ways a user can become a member of a security group?
Workday Delivered, Manually Assigned, and Derived
27
Define Workday Delivered
Workday defines security group definitions, determines membership criteria, and maintains
28
Is Workday Delivered configurable?
No - can't create, edit, or delete
29
Example of Workday Delivered
All Employees, Employee as Self
30
Define Manually Assigned
Manually add or remove users from user-based & integration system group types
31
Example of Manually Assigned
Payroll Administrator
32
Define Derived
Membership is based on certain security group criteria
33
Example of Derived
HR Partner Role
34
Group types in Derived
Role-based, Integration System, Location Membership
35
Define Constrained
Access to only their own instance of data or subset of data
36
Example of constrained
Contact information
37
Define Unconstrained
Access to all instances of data
38
Self-Service Security Group Type
Workday delivered access to user's own data
39
Example of Self-Service
Employee as Self
40
Role-Based Security Group Type
Membership derived from an assigned role, can be constrained or unconstrained
41
Example of Role-Based
HR Partner
42
Public Security Group Type
Workday delivered access to public data
43
Example of Public
All Employees
44
Segment-Based Security Group Type
Based on included security groups & allows constrained access to segments of values
45
Example of Segment-Based
Security group of sales managers to track travel expense specific to their department
46
Job-Based Security Group
Membership derived from job criteria, can be constrained or unconstrained
47
Example of Job-Based
VP
48
What report do you use to see existing security groups?
View Security Group
49
What task do you use to create new security group?
Create Security Group
50
Once a new security group is created, how do you assign a user to that group?
Assign Users to _____ Security Group task - will depend on what type of group it is
51
What task do you use to edit security policy permissions to include new security groups?
Maintain Permissions for Security Group
52
How do you make security changes active?
Activate Pending Security Policy Changes task
53
What security group should you use as much as possible?
Workday-delivered
54
Avoid overusing which which security group type?
User-based
55
What task would you use to add or remove a security group from multiple domain security policies?
Maintain Permissions for Security Group
56
View Security Group report
Details about specific security group
57
View Security Groups report
All security groups in tenant
58
Action Summary for Security Group
Security policies tied to a security group
59
Security Analysis for Security Group
Domains, reports, tasks, integrations, and bp types for a security group
60
Security Analysis for a Workday account
User's cumulative access in a tenant
61
View Security Groups for User
Security groups a user is a member of
62
User-Based Security Group
Least restrictive, provides members unconstrained access to items in permitted security policies
63
What happens when you manually assign user-based security groups?
Stays with that user regardless of position or job changes
64
What security group is most appropriate for administrators?
User-based
65
Two tasks that can assign user-based security
Assign Users to User-Based Security Group, Assign User-Based Security Groups for Person
66
Role-Based Security
Assign permissions to the position the worker is in, rather than the worker themselves
67
What is the difference between user-based and role-based security?
User-based is based on individual user, role-based is based on position itself
68
What is a common way to enforce target constraints on members of a security group?
Organizations
69
Example of role-based security
Worker hired into a supervisory organization, but can also be part of company, cost center, or region
70
What is an Assignable Role?
Criteria for membership of Role-based security groups, responsibilities given to users for viewing, reporting, or managing data related to role-abled instance
71
What task do you use to create a new assignable role?
Maintain Assignable Roles
72
Testing Security Group Membership report
Can ask if the user is in a specified security group & has access to target instance
73
Compare Permissions of Two Security Groups report
Analyzes permissions of two security groups
74
Compare Security of Two Worker Accounts report
Lists the roles & security group assignments in common and exclusive between the two workers
75
Example of when a security change requires activation?
Adding a security group to a domain or bp security policy
76
Example of when a security change does not require activation?
Changing role assignments or membership is security groups
77
Which security group type requires you to manually assign and remove it?
User-based
78
Which security group type is tied to an assigned role and can be constrained or unconstrained?
Role-based
79
Which security group type provides unconstrained security access?
User-based
80
Constrained or Unconstrained: An HR Administrator needs to access total compensation records for all employees
Unconstrained
81
Constrained or Unconstrained: A manager needs access to records for the employees that report to them
Constrained
82
Constrained or Unconstrained: An HR Partner is filling in for a different department
Constrained
83
Constrained or Unconstrained: The IT HelpDesk Specialist needs to unlock Workday accounts tenant-wide
Unconstrained
84
Constrained or Unconstrained: A Payroll partner from the US is only supporting organizations in Europe
Constrained