Role Based Security
Security Roles and Permissions
- A security role allows a person to see or do things within Workday.
- Security roles are generally assigned to positions, and allow employees to complete the work required by their position.
- Roles will be used to determine what Workday training employees are expected to complete.
All workers will have some self-service access in Workday.
What is Role-Based Security?
- Role-Based Security is a collection of permissions operating within a business process which govern what actions you can take in that process.
- Role-Based Security determines what data you can view, including reports
- Workday clusters related business processes together, but we decide which roles will get access to which group of items!
Benefits of Role-Based Security
- Currently security is on a person; in Workday it’s on a position.
- Security roles are assigned based on what a position does.
- The number of roles a person has will vary by department.
- The roles on a position can change if needed.
- Expect tighter control of data to protect the University.
- Functional first: departments are driving which positions get which roles.
Role-Based Security Is NOT:
- A direct match between a role and your job title
- One role with a comprehensive set of all your job duties
- Meant to tell departments how to divide up work
- Unchangeable
If you find that your role based access does not meet the requirements of your duties, you can request a review of your access through Workday.
- Login to Workday
- In the Search Bar type "Create Request"
- Select the "Create Request" task

4. To identify the correct Request Type, Type "Security". A drop down of the requests associated with Security will appear.

5. Fill out the form and "Submit"
This request will route automatically to the appropriate approvers.
To check the status of the request go to "My Tasks" and select "Archive", then search for the Security Request.
