Workday integrations are vital for organizations to streamline their processes and enhance productivity. However, these integrations can introduce significant security risks if not managed properly. As an IT manager, it’s crucial to understand how to secure these integrations to protect sensitive data and maintain compliance with industry standards. In this blog, we'll delve into the intricacies of Workday's integration security model and provide practical tips to configure your Workday Integration Security.
At the core of Workday's integration security lies a sophisticated system of controls and permissions. Let's break it down:
Security Domains
Workday offers different security areas to control how users access integration templates and systems. These areas help separate the permissions needed to set up an integration from those needed to run it and see the output. You can also divide integration templates and systems into parts and give access to each part individually.
The table below shows the security areas related to integrations and the permissions granted for each domain.
Workday employs distinct security domains to separate the powers of configuring, executing, and viewing integrations. This ensures that only authorized personnel can perform specific actions. For instance, you can configure an integration without having the authority to run it or view its output.
Access to Workday Data
Access to Workday data is done through web services and Reports-as-a-Service. These services, along with report data sources, fields, and custom reports, are secured by different security areas. Integration systems and external systems accessing Workday need the correct (Get/Put) access to the areas that include the web services. They also need the right (View) access to the areas that cover the report data sources and fields. Outbound EIBs need access to the custom reports they use as data sources.
Cloud Connect and Studio integrations need an Integration System User account for authentication and access to web service tasks. Each integration system must have its own unique Integration System User account. These users are always part of Integration System Security Groups and can't be part of any other security group type. For the integration to function properly, the security group of the Integration System User must have Put and Get access to the areas that contain the web service operations that work with the required data.
Before diving into the creation process, let's recap:
The process is explained for setting up a new ISU by entering user details, such as username, password, and session timeout settings to ensure successful integration execution in Workday.
Note: Keep the Session Timeout Minutes default value of 0 to prevent session expiration. An expired session can cause the integration to time out before it completes.
1. Access the Create Security Group task: Navigate to the appropriate section in your Workday instance to initiate the creation of a new security group.
2. Provide Essential Information: Enter a descriptive Name for the ISSG and select the appropriate type (constrained or unconstrained based on your requirements, we will use the Integration System Security group (unconstrained) here and click OK
Here, it explains the process of creating an integration system security group in Workday using the Create Security Group task.
3. Assign ISSG and associate the newly created ISSG with the ISU to grant it the necessary permissions.
4. Once the Integration System Security group is created, you may add integration System users. Multiple Integration System Users can be associated with a single Integration System Security Group, each receiving the same permissions.
Illustrating how to associate a newly created Integration System Security Group (ISSG) with an Integration System User (ISU) in Workday.
Grant the ISSG access to the necessary domains by editing domain security policy permissions. This involves specifying Get and Put access for relevant data elements. There are multiple ways to grant domain permission.
To grant the security group access to the domains required by your integration, perform the following steps for each domain:
The above screenshot shows how to view the Domain report in Workday and select a specific domain for editing.
The above image highlights the steps to modify permissions for specific domains and how to edit the domain security policy in Workday.
This screenshot shows how to maintain domain permissions for a security group in Workday and shows the steps to add domains to the security group and grant "Get" and "Put" access for integration-related tasks.
We can also grant domain permissions in the following way:
Here, the image illustrates the Maintain Domain Permissions feature for a Security Group in Workday.
Note: Workday secures data access through web service operations, Reports-as-a-Service, and Data Initialization Service (DIS). Utilizing security domains controls access to data elements, ensuring that integrations only have the necessary permissions.
Displaying the activated pending security policy changes in Workday. It highlights the confirmation of recent updates to security permissions.
While Workday provides a solid foundation, additional measures are crucial for comprehensive protection:
Integration System Security Groups (ISSGs) are a cornerstone of Workday integration security. Here are some practical tips for effective ISSG management:
Workday’s robust security framework is essential for safeguarding sensitive data within integrations. Organizations can significantly enhance their security posture by leveraging security domains, ensuring proper access controls, and adhering to best practices such as regular audits, strong password management, and employee education. Proper management of Integration System Security Groups (ISSGs) further reinforces the integrity of your integrations, ensuring that only authorized users can access critical data and functionality. By understanding Workday's security model and implementing these best practices, you can significantly enhance the protection of your sensitive data and ensure the integrity of your integrations.