Skip to content

Workday@Clemson

Security Roles

Workday uses role-based security, which means that security roles are assigned to positionsnot to individual users. Roles define who can see what information and who can take what actions in the system. 

View

View reports and information in Workday, without modifying it.

Do

Perform tasks in Workday, such as entering or modifying data or starting a business process.

Approve

Approve transactions or tasks in Workday and modify the data.

Review

Review data someone entered through a business process and send transactions back if errors are identified.

Security roles are most often assigned to a position. Think of a position as a chair. Whoever sits in the chair (the faculty or staff member holding that position) gets the security roles attached to it. When someone leaves that chair for another job, the roles stay with the chair. The next person who fills the position automatically has the security they need to do their work. 

The person who moved on will then receive the security roles tied to their new chair (new position). 

A person or a position can have more than one security role in Workday. A person may have multiple security roles based on the position they hold and any additional responsibilities.

There are several roles, like Employee as Self and Manager, that enable self-service capabilities in Workday (such as viewing a paystub or entering time) and are automatically assigned based on job attributes.

FAQs