Chapter 3: Security Flashcards
(28 cards)
What field in Maintain Assignable Roles governs which user’s picture will display when viewing the organization chart?
Is Leader/Is Supporting
What does the View Security for Securable Item report display?
The security groups required to run or view a task or report
You create a new role-based security group and assignable role. When viewing the assignable role, the For Security Groups section is empty. Which steps do you take to correct this?
Edit the new security group and update the assignable role field
What is the first step of creating a role-based security group?
Create assignable role
What task do you use to create an assignable role?
Maintain Assignable Roles
If you create an assignable role and the role isn’t a member of the security group, what might be going on?
Role isn’t attached to the security group, need to input new role in ‘Assignable Role’ under Edit Security Group
Define security configurator
Manipulates domain and bp security policies. Assign workers to security groups
What type of security group would a security configurator be in?
User-based
Define Security Admin and determine what type of security group it would be in
Manages all security related information regardless of organizations (i.e. creating Workday account, establish passwords, view security reports) - user-based
What does the Maintain Functional Areas report do?
Report that has domains & bps for a functional area
What report would you run to see all the domains & bps for a functional area?
Maintain Functional Areas
Give examples of Domains
Custom objects, data sources, instance sets, report fields
What do domains control?
Views into data
What is a BP?
Work flow definition that are events or tasks
What do BPs control?
What can I do in the system
What does View Security for Securable Item allow you to do?
View what security groups grant access to specified securable item
Define role-based security groups
Commonly used to identify users in key support or leadership roles support different orgs
Is role-based usually constrained or unconstrained?
Typically constrained
Define user-based security group
Commonly used to give admin system-wide access to data
Is user-based usually constrained or unconstrained?
Unconstrained
What does copying a security group do?
Copies existing permissions & existing members
What are the steps to creating a new security group?
- Create a role, 2. Create security group, 3. Assign Role, 4. Edit Security Policies, 5. Activate
What is the Maintain Assignable Role task?
Gives access to all org roles and all types
True or False: role name should match security name
True