Security Roles
Workday uses role-based security, which means that security roles are assigned to positions, not to individual users. Roles define who can see what information and who can take what actions in the system.
View
View reports and information in Workday, without modifying it.
Do
Perform tasks in Workday, such as entering or modifying data or starting a business process.
Approve
Approve transactions or tasks in Workday and modify the data.
Review
Review data someone entered through a business process and send transactions back if errors are identified.
Security roles are most often assigned to a position. Think of a position as a chair. Whoever sits in the chair (the faculty or staff member holding that position) gets the security roles attached to it. When someone leaves that chair for another job, the roles stay with the chair. The next person who fills the position automatically has the security they need to do their work.
The person who moved on will then receive the security roles tied to their new chair (new position).
A person or a position can have more than one security role in Workday. A person may have multiple security roles based on the position they hold and any additional responsibilities.
There are several roles, like Employee as Self and Manager, that enable self-service capabilities in Workday (such as viewing a paystub or entering time) and are automatically assigned based on job attributes.
FAQs
-
Is my information secure in Workday?
Yes. Workday uses industry-standard security protocols, and Clemson will maintain strict access controls.
-
Who can see my information?
Access is role-based. Only authorized individuals (e.g., your manager, HR) can view relevant data.