Click to rate this post!
[Total: 0 Average: 0]

Security Interview Questions and Answers-Workday 

1. user gets an error trying to access an inbox item. What could cause that?

It is possible that you configured a user to perform a step in a business process, but after the process was initiated, someone changed the security policy for that business process. Now the user does not have access permission and cannot respond to the inbox item. Go with workday online training to get better improvement in workday technology.
Run the Security Exception Audit report and look for that business process.The appropriate person should reassign the errant step and redefine the process to ensure that only valid security groups are specified.

2. How do I add users to a user-based security group?

To add members to a user-based security group use the Assign User to User-Based Security Group task.
To add a user to more than one user-based security group at a time, use the Assign User-Based Security Groups for Person task.

3. Where can I find out where and how securable items are secured?

To see how a report or a task is secured, run the View Security for Securable Item report.

4. Where can I see all the permissions granted to a security group?

Use the View Security Group report. This report has a Security Permissions tab for the domain security policies and a Business Process Permissions tab for the business process security policies. You navigate to any security policy and see the securable items to which access permission is granted.

5. How can securable items end up with invalid access and how do I fix it?

The Security Exception Audit report identify any problem area. The problem and solution are explained for each exception. Generally, all you have to do is remove the invalid security group from the policy or business process.
For business processes that are already started, reassign the step that is routed to an invalid user,or rescind the process. In either case, be sure to change the business process definition for that organization to specify only valid security groups.

6. What if users cannot see an item to which they should have access?

1. Run the View Security for Securable Item report, specifying the name of the securable item.
2. Select the security policy that controls this securable item.
3. Make a note of the security groups that have permission to access this securable item.
4. Run the View Security Groups for User report and specify the user who should be able to see the securable item.
5. Compare the security groups for the worker with the security groups for the securable item.
6. Determine whether the worker should be added to one of the security groups that has access to this item,
or if a security group the worker is already in should be granted permission to access the item.

7. What if users can access an item to which they should not have access?

1. Run the Security Analysis for Action report, specifying the name of the user and the action.  This report shows all the ways in which the user is granted access to the action, even if the action  appears in multiple domains.
2. Determine whether a security group needs to be removed from the security policy or the user needs to be removed from a security group.

to our newsletter

Drop Us A Query

Trending Courses
  • Microsoft Azure Architect Technologies(AZ-300) | ITGuru
    Microsoft Azure Architect Technologies(AZ-300)
  • Azure is a great Microsoft Cloud Computing platform in providing various cloud services through online. ITGuru Certified Azure Architect certification course gives you the practical knowledge on Azure Cloud platform through real-world use cases from live experts

  • ServiceNow Admin Training | ITGuru
    ServiceNow Admin Training
  • Getting knowledge of cloud platforms like ServiceNow is essential in today’s world for the smooth running of projects in cloud platform. Turn your dream to the reality of becoming the Certified ServiceNow Administrator through ServiceNow Administration online certification Course with practical examples by live industry experts through online at ITGuru with real-world use cases.

  • Workday Financials Training | ITGuru
    Workday Financials Training
  • knowing the basics on any platform like Workday is not enough to sustain the IT industry. Hence it is essential to go beyond on Workday basics like Workday Financials training which lets you know the application of Financials management in real -world use cases from ITGuru Live Experts in a practical way.

  • Workday Training
  • An organization is considered as the best one when it offers the best benefits to the employee. Moreover, the greater the employee benefits, the greater the contribution to the organization. ITGuru let you know the practical workday Human Resource Management(HRM) features with live examples by experts

  • Python Online Course | ITGuru
    Python Online Course
  • Turn your dream into reality by ITGuru live experts with real-world use cases through practical knowledge on python online course and become the certified associate in python programming and become a master in python programming

  • Python Programming | ITGuru
    Python Programming
  • Python is the trending programming language in the IT industry. Mastering in python programming gives you more value among the people in the IT industry. Hence start today to learn python programming online by live experts with real-time uses cases at ITGuru


100% Secure Payments. All major credit & debit cards accepted.

Call Now Button