- Well Built Solutions Newsletter
- Posts
- đŞ Turnover-proof your Workday processesâthe FINALE!
đŞ Turnover-proof your Workday processesâthe FINALE!
Turnover-proof your processes (part 3 / 3)
Read time: 12 minutes
Hey there! Mia here. Last week, I shared the first half of a step-by-step guide on how to successfully upgrade your process owners from employees to Integration System Users (ISUs).
Today, Iâm sharing the second half of the guide to help you get the job done đ
If you missed last weekâs newsletter (part 2 of 3), I highly recommend you check it out before diving into todayâs (which is part 3 of 3). If youâre new to this three-part series, donât worryâyou can catch up belowđ
Hereâs the agenda for todayâŚ
â How to Turnover-Proof Your Scheduled Processes â
Part 3 (today):
Step 5: Create Your ISSGs
Step 6: Transfer Ownership of Your Processes
Step 7: Test, Test, TEST!
Step 8: Deploy Your Upgrades to Production
â Why You Need to Turnover-Proof Your Processes
â Step 1: Assess Your Processes
â Step 2: Understanding ISUs and ISSGs
â Step 3: Create Your Upgrade Plan
â Step 4: Create Your ISUs
FYIâthis half of the guide is SO jam-packed with info that we couldnât fit your release prep and brainteaser segments today (who knew there were email length limits đ ). Weâll be back with those next week!
With that, itâs time to finish turnover-proofing your processes, my friends đ ď¸ Here we goâŚ
Step 5: Create Your ISSGs (in a Test Environment)
Last week, we ended part 2 of turnover-proofing your processes by creating your integration system users (ISUs). Now itâs time to create the integration system security groups (ISSGs) that will give your ISUs access to own and run your processes.
As a reminder, steps 4 - 6 should be completed in a test environment. I recommend a recently refreshed copy of Preview or an Implementation tenant as opposed to Sandboxâyou may need more than a week or two to complete your testing.
Create the security groupsâŚ
Creating a process-owning ISSG itself is straightforward. Hereâs how in 3 steps before we dive into provisioning more detailed securityâŚ
Run the Create Security Group task. Create an âIntegration System Security Group (Unconstrained)â security group. Unless you have a reason to restrict ISSG access contextually (e.g. by organization), your process-owning ISSGs will be unconstrained:
Once you create the ISSG, add the appropriate ISU (per the upgrade plan Excel spreadsheet you created last week in step 3) in the âIntegration System Usersâ input.
There are 2 base-level permissions I recommended giving your ISSG off the bat. These permissions provide access to the complete Scheduled Future Processes report for testing in step 7:
Domain Security Policy: Custom Report Creation (View/Modify)
Domain Security Policy: All Background Processes (View Only)
Provision and activate this access during your initial ISSG setup using the Maintain Permissions for Security Group and Activate Pending Security Policy Changes tasks, respectively.
This screenshot may save you hours of testing setup troubleshootingâyouâre welcome! đ
Iâve found these permissions to be the most efficient way to provision base-level, process-ownership access. Ultimately, your ISU will only be able to run processes that it specifically owns. This base-level access comes with little risk and positions you for a smooth testing process.
Provision security for your ISSGsâŚ
Iâll give it to you straightâprovisioning security can be tough.
Thereâs no one-size-fits-all approach to determine what security is needed to run and own each job, report, and integration process. If youâre not well-versed in Workday security, youâll likely need support from a security specialist and/or product area experts.
Broken down by process type, hereâs how to approach nailing down what permissions your ISSGs needâŚ
Jobs
First, a quick callout for alerts, which are usually a large proportion of all scheduled jobs. To own and run your alert jobs, your ISSG will need access to:
Domain Security Policy: Notification Alerts (View/Modify)
Your alert-owning ISSGs will also need to own the report your alert is built on, and have access to any tasks and content within the alert itself.
For most other scheduled jobs, the View Security for Securable Item report is a great place to start. Letâs say you need to create an ISSG for your Mass Submit Time process. Hereâs how to determine what security your ISSG_Mass Submit Time needs:
Run the View Security for Securable Item report for the Securable Item âMass Submit Timeâ to determine what domain(s) secure the task.
Click the âView Securityâ button on each Task, Report, and Background Process to review the domain(s) that secure the task.
The domain security policy that secures the Mass Submit Time task is âProcess: Mass Submit Timeâ. Notice that the permission required is âModifyâ. To run the Mass Submit Time process, âViewâ permission isnât sufficient.
Youâre not done yet! Next, consider what other security is needed to successfully run the jobâin this case, to submit time. For example, your ISSG_Mass Submit Time will also need:
Business Process Security Policy: âSubmit Timeâ Initiating Action access on the Enter Time business process
Domain Security Policy: Worker Data: Time Tracking (View/Modify)
If youâre not sure where to start, a quick Community search is typically fruitful! đ
Run the task Activate Pending Security Policy Changes to activate the security youâve provisioned. Thoroughly document your activations with a detailed comment, even in your testing tenant! You can run the View All Security Timestamps report throughout testing to remember what changes you made.
Reports
To run your scheduled report processes and deliver the report output, your ISSG needs access to these two domains:
Domain Security Policy: Report Output Sharing (View/Modify)
Domain Security Policy: Scheduled Report Processes (View/Modify)
Beyond these permissions, your ISSG also needs full access to the custom reports it will run and own. This includes all data sources, fields, calculated fields, filters, prompts, etc.
As I mentioned last week in step 3, I recommend creating one master ISU/ISSG pair to own your report processes.
Begin by reviewing your list of scheduled reports to understand what type of data your ISU will need access to. What data sources are your reports built on? Are most of your scheduled reports worker-based?
Once youâve assessed the contents of your scheduled reports, there are various ways you can approach provisioning security. Here are two ideas to get your gears âď¸ turningâŚ
Copy Existing Security Group Permissions
Use existing security groups as a base for your ISSG. For example, letâs say you know that HR Administrators can successfully run all of your scheduled reports. You can begin the provisioning process by copying HR Administrator permissions to your ISSG_Reporting group. Use the task, âMaintain Permissions for Security Groupâ:
âď¸ Note: You can only copy access to domain security policies. Business process security policy permissions must be added manually.
If your reports include business process transaction data, note that your ISSG also needs âView Allâ access on those business process security policies.
Analyze Scheduled Report Security via Custom Reports
Create custom reports to help you determine what security is needed to fully access and run a custom report.
Build these reports on the âAll Custom Reportsâ and âAll Fieldsâ data sources. These data sources can provide insight into the security needed to view all fields and calculated fields used within your scheduled reports.
Integrations
As we discussed last week, more so than jobs and reports, Iâd expect that your integrations themselves, and their scheduled processes, are already owned by ISUs. If youâve got a significant amount of owner upgrading to do for your integrations and their scheduled processes, work with a trusted integrations expert to fix this (we know a few great ones if you need recs!).
If youâre in a bind and need to figure it out yourself, hereâs my best adviceâŚ
Thereâs solid documentation on Community for common integrations. For example, if you search âE-Verify Integrationâ on Community, you can find the Workday documentation for setting up the E-Verify Integration. This documentation lists the Get and Put access your ISSG will need, among other setup steps.
You can also use the View Security For Securable Item report I mentioned earlier to scope security for the web services, report data sources, etc. that your integration uses.
Before we move onâŚ
Step 5 isnât complete until youâve finished testing. Provisioning security is often an iterative process. As you test in step 7, you may come back to step 5 to troubleshoot and nail down permissions that your ISSGs are missing. If you hit roadblocks while testing, keep going! Youâve got this đŞ
Step 6: Transfer Ownership (in a Test Environment)
Once your ISUs and ISSGs are set up, itâs time to transfer ownership of your processes! But firstâŚ
Transfer ownership of all underlying custom reports that are scheduled or referenced in alerts to the ISU that will own its process. The configuration within a process should also be owned by the ISU to prevent failures.
Next, you can finally transfer ownership of scheduled future processes. Unfortunately, this is a tedious, manual processâownership is transferred one process at a time.
âď¸ And take note⌠when you transfer ownership of a process, the process Share settings are erased (one of those Workday âquirksâ you should be aware of). Hereâs a quick trick to prevent this.
To transfer ownership of a process, run the report, Scheduled Future Processes. From the âScheduled Processâ column, click on the related actions button, hover over âScheduled Future Processâ, and click âTransfer Ownershipâ (DONâT forget to use the trick linked above!).
If your ISSG lacks access needed to own a process, your intended ISU wonât be an option at this step. If this happens to youâno biggie! Return to step 5 and troubleshoot security.
Step 6 is complete once all processes on your list, and their underlying components, are owned by their newly assigned ISU.
Step 7: Test, Test, TEST!
The purpose of testing here is to confirm that your ISUs can successfully run the scheduled processes they now own.
Reopen the upgrade plan Excel spreadsheet you created last week in step 3. Add a column or two in which you can track your testing outcomes. Ensure you document your testing! Once these upgrades are moved into PROD, you DONâT want any issues traced back to lazy, undocumented testing.
When testing scheduled processes, itâs not uncommon to receive a false success message. Itâs incredibly important to support your testing with tangible proof that the process produced its intended outcome. I recommend taking screenshots of every successful test to show a) the ISU ran the process successfully and b) proof of the expected outcome.
Okay, Iâve emphasized the importance of documenting your testing đ OnwardâŚ
Last week in step 4, when you created your ISUs, remember how you left that âDo Not Allow UI Sessionsâ box unchecked? That setting is what will now allow you to log into your testing tenant as each ISU.
Before you can begin testing, thereâs one additional setup step to complete (you wonât be able to test without it)âŚ
đĄ Add your new ISSGs to your testing tenantâs Authentication Policy to allow the ISUs to log in by username/passwordâŚ
Run the Manage Authentication Policies task and edit the policy for your test environment. If the policy already has a rule for integrations or APIs to log in by username/password, add all of your new ISSGs in the âSecurity Groupâ input. If it doesnât, you can add a rule as follows:
Another screenshot that may save you hours of troubleshooting your testing setup đ
Activate All Pending Authentication Policy Changes once youâve set this up.
Now, you can finally log in as your ISUs to test your processesâŚ
Log into your testing tenant as your ISU using the username and password you set when you created the ISU in step 4 (the username is just the name of the ISU).
âď¸ Note: In this guide, the tenant color will be orange when logged in as the ISU.
Run the report, Scheduled Future Processes. Filter the âOwned by Userâ column for the ISU that youâre logged in as.
Click the related actions button on the Scheduled Process, hover over âSchedule Future Processâ, and click âRun Nowâ. On the next page, check the box to âConfirmâ the run, and press OK.
If the process fails or doesnât produce the results you were expecting, the most likely culprit is security (or lack thereof). Return to step 5 and troubleshoot to determine what additional access your ISSG needs to successfully execute the process.
Confirming that each process ran successfully will look a bit different for each process typeâŚ
Jobs:
For most scheduled jobs, mock up a test scenario to verify that the process ran successfully. This requires some job-specific subject matter expertise. For example, if youâre testing a Mass Submit Time process, hereâs how youâd mock up a test:
Create a time block or two using the Enter Time task to add time for a worker in the target period.
Run the scheduled Mass Submit Time process ânowâ logged in as the ISU.
Manually check the workerâs time calendar to confirm that the time block you entered was submitted by your process.
Every job type will require a different mock-up. For example, if youâre testing a Find Duplicates process, ensure thereâs at least one set of duplicate worker records in your tenant to be mergedâcreate a set if you have to!
Alert jobs are simpler to test. Run the alert process as your ISU, and proxy as a known target recipient to ensure they received the notification as expected.
Reports:
First, search for and run the underlying custom report logged in as your reporting ISU. Confirm that your ISU can access and run the full report as its owner. If everything looks goodâŚ
Run the scheduled report process, and confirm a target user receives the output as expected. Proxy as the target user to confirm the output is in their notifications and âMy Reportsâ. Review the file to confirm the data was output as expected.
Integrations:
Testing integration processes is more elaborate, as it involves data coming into Workday or being sent outside of Workday. Coordinate with your integrations team and/or third parties as neededâa test environment typically needs staging outside of Workday.
When testing integration processes, ensure that the âRestricted to Environmentâ setting on your process is updated to your test environment.
For job and report processes, you donât need to change the âRestricted to Environmentâ settingâeven if itâs listed as PROD. The processes will still run in your test environment, and will not run in Production.
Step 8: Migrate Your Work to Production
Once youâve completed your testing (and youâve got the receipts to prove it!), itâs time to replicate your work in PROD. âMigrateâ isnât quite an accurate term here, as the configuration components youâve built in this process arenât migratableâyouâll need to rebuild your work manually.
Repeat steps 4 - 6, this time, in your Production tenant:
*Create your ISUs (step 4)
Create your ISSGs (step 5)
Transfer ownership of the processes (step 6)
This time around, your work is unambiguous. Youâve completed all the hard work of planning, provisioning, and testing. Now, youâll just need to carefully and accurately replicate the setup in Production.
âď¸ *Take note⌠there are two (very important!) additional setup steps when creating your ISUs in Production:
Remember that box we left unchecked in step 4? This time, make sure you check the âDo Not Allow UI Sessionsâ box. This locks down the ISU account, ensuring that no person or AI can log into your Production tenant as your ISU.
Once youâve created all your ISUs, run the task, Maintain Password Rules. Add your new ISUs to the âSystem Users exempt from password expirationâ input to ensure that your ISUs never expire.
There you have it! Once the transfer of process ownership has been completed in Production, your processes are officially turnover-proofed â¨
In the weeks following your completion of this effort, keep a close eye on your upgraded processes to ensure they run smoothly.
đđđ
If you feel like youâre constantly putting out fires in your tenant, turnover-proofing your processes is your first step to moving from reactive â> proactive.
While the process can be tedious, itâs worth it! Weâve never worked with a client who regretted turnover-proofing their processesâbut we have worked with numerous teams who regretted putting it off.
As always, thank you for reading.
Weâre celebrating you and your pursuit of a Well Built Workday đĽł
See you next week!
Ceci & Mia
Co-Founders of Well Built Solutions
Say hi đ on LinkedIn â @ceciblomberg, @miaeisenhandler
Reply