Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
1
Your screens may vary from this document. ©2015 Workday, Inc.
o
o
o
o
o
o
o
o
2
Your screens may vary from this document. ©2015 Workday, Inc.
3
Your screens may vary from this document. ©2015 Workday, Inc.
4
Your screens may vary from this document. ©2015 Workday, Inc.
o
o
5
Your screens may vary from this document. ©2016 Workday, Inc.
o
o
o
o
o
o
o
o
o
o
o
o
o
o
6
Your screens may vary from this document. ©2016 Workday, Inc.
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
7
Your screens may vary from this document. ©2016 Workday, Inc.
8
Your screens may vary from this document. ©2016 Workday, Inc.
o Functional Areas, Domains and Business Process Types
o Domain Security Policies
o Business Process Security Policies
o Delivered & Workday Assigned Security Group Types
o Constrained vs. Unconstrained Security Groups
o User-Based Security Groups
o Role-Based Security Groups
o Job-Based Security Groups
o Segment-based Security Groups
o Membership Security Groups (Location Membership & Organization Membership)
o Intersection Security Groups
o Aggregation Security Groups
o Service Center Security Groups
o Integration system security groups
o Level Based Security Groups
o Security methodology
o The steps for configuring security
o Recommendations
o Managing Workforce Security Assignments
o Security Configuration Restrictions
9
Your screens may vary from this document. ©2016 Workday, Inc.
o Reports and Other Tools
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o