- Well Built Solutions Newsletter
- Posts
- šš The major Workday security upgrade you should set up ASAP
šš The major Workday security upgrade you should set up ASAP
Setting up the new user-based security group assignment business processes
Read time: 8 minutes
Hey there! Managing user-based security group assignments has been a major pain point for Workday customers for years on endā¦
Until now! Those days are finally behind usāif you implement the new functionality š
In todayās newsletter, Iām sharing a step-by-step guide to help you successfully upgrade your security setup.
With 2024R1 and 2024R2, Workday released two new business processes that replace the old, non-workflow-enabled tasks for assigning user-based security groups. With these business processes, we say goodbye toā¦
š Lack of approvals and process visibility
š Compliance risks / SOC concerns galore
š Lousy delivered and custom reporting
The User-Based Security Group Event for User business process replaces the āAssign User-Based Security Groups for Personā task for assigning / removing multiple user-based security groups for a user (2024R1).
And the User-Based Security Group Event for Group business process replaces the āAssign Users to User-Based Security Groupā task for assigning / removing multiple users from a single user-based security group (2024R2).
Out with the old and in with the new! Seriously, donāt sleep on implementing these game-changing upgrades.
Without further ado, grab your coffee or tea, and letās get this party started! šš»
Step 1: Plan your projectāthe well built way!
The best way to ensure your Workday initiatives are successful, no matter how mini or massive the undertaking, is to structure your work as projects. Whether youāre rolling out a new module or simply deploying a new business process, a āØ project structure āØ inspires accountability, organization, and execution.
So before we dive into configuring your security upgrade, letās set you up for success! The more thought you put into this step, the better your deployment will be.
You can think of this implementation as a mini project. Here are your phases and steps:
Plan:
Step 1: Project planning: Team, timeline, requirement gathering
Configure:
Step 2: Enable the new domain, āProcess: User-Based Security Group Eventā
Step 3: Create your new business processes
Step 4: Configure your business process security policies
Step 5: Configure your business process definitions
Step 6: Set up custom business process notifications (if you want!)
Step 7: Disable the old functionality
Test:
Step 8: Test!
Document and empower:
Step 9: Document your new setup and educate your team
Deploy:
Step 10: Go live in PROD š
For this mini project, you can split planning into 3 stepsā¦
Build your team - who is responsible for each step of this project?
Establish a project timeline - how long do you expect each project phase to take? Hereās a high-level 6-week sample timeline. You can tighten or extend this to match your teamās pace and bandwidthā¦
Plan (2 weeks)
Configure (1 week)
Test (1 week)
Document and empower (1 week)
Deploy (1 week)
Requirement gathering: What information do you need to implement this upgrade? Focus onā¦
BP definition workflows - what steps, actions, and/or approvals should kick off in Workday when a user-based security group assignment or removal is initiated for a) one user for one or more groups and b) one group for one or more user? Map these workflows in detail.
BP security policies - who / which security groups will have which business process access? Consider all permissions on each BP security policy. Here are a few heavy hittersā¦
Initiate, Review, View All (Needed to view the event data for reporting), Approve, Cancel, Deny
Custom notifications - do you need to notify workers, security groups, and/or third parties with specific information when a user-based security group assignment or removal is completed?
Change management - who needs to be trained on this upgrade? How will you inform, educate, and empower them?
Alright! šŖ That was no easy featābut getting the details right from the get-go is a winning strategy (and we want you to win!). With this preparation complete, youāre ready to cruise through the rest of this mini project š So letās get to itā¦
Step 2: Enable the new domain, āProcess: User-Based Security Group Eventā
Navigate to the domain, āProcess: User-Based Security Group Eventā. Your quickest way there is to use the prefix ādomain:ā in the search bar.
Click the related action button next to āDomain Security Policyā, hover over āDomain Security Policy,ā and click āEnableā. Check the āConfirmā box and press OK.
This domain automatically inherits its parent domainās permissions (Security Administration). I recommend leaving these settings in place, but hereās how to edit the permissions more granularly:
Click on the related action button on the domain, hover over āDomain Security Policyā, and click āEdit Permissionsā. Update the View, Modify, Get, and Put permissions as desired, then click OK.
Activation time! š„ A critical step to never forget. Navigate to the task, āActivate Pending Security Policy Changesā, leave a detailed comment, and press OK.
Your domain will now have a Status of āActiveā š
Step 3: Create your new business processes
There are two new business processes youāll need to create:
User-Based Security Group Event for User
User-Based Security Group Event for Group
In this guide, weāll walk through setting up the User-Based Security Group Event for User BP. You can then follow the same steps to set up the User-Based Security Group Event for Group BP on your own.
Use the task, āCreate Business Process Definition (Default Definition)ā, to create your new business process definition.
On your next screen titled āEdit Business Processā, simply press OK. Before you can configure steps on the business process, youāll need to set up the Business Process Security Policyā¦
Step 4: Configure your business process security policies
Click on the related actions button on the business process, hover over āBusiness Process Policyā, and click āEditā.
Configure the permissions on the business process security policy at your organizationās discretion (as you planned in Step 1!). To keep things simple, I recommend leveraging the Security Administrator and/or HR Administrator security groups.
Activation time, once more! Navigate to the task, āActivate Pending Security Policy Changesā, leave a solid comment, and press OK.
Step 5: Configure your business process definitions
Now for the fun partāwhere the magic of this upgrade happens! šŖ Letās set up the business process steps.
Navigate back to the business process, click on the related actions button, hover over āBusiness Processā, and click āEdit Definitionā.
Add your business process steps per your organizationās defined policy. Click the ā+ā button to add rows. The permissions you set up in Step 4 on the BP security policy determine which steps you can assign to which security groups.
Donāt forget to set your completion step, typically the last approval in your definition.
Other setup steps to consider here areā¦
Advanced Routing - for example, exclude initiators from approving their own assignments.
Business Process Validations - are there situations in which initiation should be blocked, or slowed with a warning?
Business Process Conditions - should certain steps be skipped if specified conditions are or are not met?
Step 6: Set up custom business process notifications (if you want!)
This step is totally optional! To add custom notifications, click on the related actions button on the business process, hover over āBusiness Processā, and click āAdd Notificationā.
Step 7: Disable the old functionality
Now that youāve got the new functionality in place, thereās no reason to keep the legacy tasks in play (unless you want to make a big oleā mess out of your audit trails šµāš«).
Hereās how to disable the old tasks once and for allā¦
Navigate to the task, āMaintain Feature Opt-Insā, find the āDisable User-Based Security Group Assignment Taskā item (filter the column to be speedy!), and click the āOpt In to Featureā button:
By disabling the existing tasks, all user-based security group assignment changes will go through the new business process. To confirm youāve successfully disabled the tasks, check the related actions on a user-based security group. Only one initiation option should remain, āUpdate Membershipā:
Before | After |
Workday hasnāt specified a deprecation date yet, however, the non-workflow-enabled tasks will be deprecated down the road. Since you are proactively implementing the new functionality, you wonāt be scrambling when that day comes š
Step 8: Test!
Use the Update User-Based Security Group Assignments initiating task to test the āUser-Based Security Group Event for Userā BP.
And use the Update User-Based Security Group Membership initiating task to test the āUser-Based Security Group Event for Groupā BP.
Test plentiful scenarios! Ensure every piece of configuration you set up is put to the test, including routing rules, BP validations, BP conditions, custom notifications, etc.
Step 9: Document your new setup, and educate your team
This is a crucial step that is so often forgotten or skipped. Before you go live in PROD, document your configuration and train your team on your new processes and policies. Ahead of going live, your team should feel empowered to utilize and own your upgraded setup.
At this stage, for our clients, we typically deliverā¦
ā User guides with clear screenshots (kind of like what youāre reading right now š).
ā Custom demo videos using our favorite recording software, Tella.
ā Live training sessions with key stakeholders and end users (we record these so they can be rewatched!).
Step 10: Go live in PROD š
Itās that time! š„³ Complete the following setup steps manually in Production:
Step 2: Enable the new domain, āProcess: User-Based Security Group Eventā
Step 3: Create your new business processes
Step 4: Configure your business process security policies
Step 7: Disable the old functionality
For maximum efficiency, migrate your business process definitions (the following steps) using Object Transporter:
Step 5: Configure your business process definition
Step 6: Set up custom business process notifications (if you want!)
To migrate your BP (including any custom notifications), click the related action button on the BP, hover over āInstanceā, and click āMigrate with Object Transporter (FYI - Workday dropped the 2.0 from OXās name with 2024R2).
As you deploy your setup in PROD, ensure you complete your configuration steps in order.
And there you have itāyour security upgrade mini project is COMPLETE!
ššš
As always, thank you for reading!
Weāre celebrating you and your pursuit of a Well Built Workday š„³
Until next time!
Ceci & Mia
Co-Founders of Well Built Solutions
Say hi š on LinkedIn ā @ceciblomberg, @miaeisenhandler
P.S. When youāre ready, hereās how we can helpā¦
Learn Workday calculated fields: Master calculated fields in Workday once and for all with our free 34-part ā ļø Calculated Fields Demystified š¤ļø LinkedIn series.
Accomplish your phaseX projects: Crush your organizationās Workday roadmap, get your projects done well, and have fun while you do it!
Get Workday guides and training: Custom documentation and training videos that upskill your team and workforce. Book a call with us to learn more.
Reply