Showing posts with label Workday Core HR. Show all posts
Showing posts with label Workday Core HR. Show all posts

Sunday, September 13

How to set up Termination Categories in Workday Core HCM?

Termination Categories


When you are performing a termination transaction or an End Worker Contract for an Employee / Worker in Workday, you will see the Termination Category and Sub Category. Have you ever wondered where these can be maintained? If so it is with the help of task Maintain Termination Categories.

Example: Termination Category        - Voluntary
                Termination Sub-Category - Career Move

Go to the task Maintain Termination Categories, notice couple of Termination Events, you will see End Contingent Worker Contract / Terminate Employee. Depending on your need, you can go ahead and configure it on the next screen.

Here on this screen by clicking on add button you may add a new reason or you can edit the existing ones. Notice the other fields that you see on the same screen that you can maintain like Eligible for Rehire, Inactive, usage etc.,
Access the report Termination Categories
You have a report to see what are the existing values. 




Wednesday, June 26

Interview Questions: Security

Workday Security Interview Questions


There is no inheritance for business process security policies (true / false)

True


Roles are used to drive business process management (true / false)

Yes


Which type of security groups is optional and customer-defined?

Job Based Security Group is optional


What type of Security Group are these: Report Writer; Setup Administrator ?
User Based Security Group

Editing a security policy takes effect immediately? (true / false)

False (Need to ‘Activate Pending Security Policy Changes)


The following are true about User-Based Security Groups

Grants access across the system

Multiple people can be members if same user-based security group


Is it possible to activate a previous timestamp while making changes needed to fix present security configuration?

  Yes
   
 You may configure securable actions and securable reporting items in a domain security policy.

 False


The following report views permissions the specified user has an action & also security policies and groups that grant access

 Security Analysis for Action


What are the different ways to assign security groups?
By the system based on a process
Manually

 Is Report Writer a role-based security group
No


  Which of the following is not securable area of business process

 Create new sub-processes


 In case a secured item is included in more than one domain security policy, workers who are granted different levels of access permission in different domains get the most access granted

  True


The following report views all domain security policies and business process security policies that use the security group:          

      Action Summary for Security Group

  Editing a child security policy does not affect inheritance in any of the others

 True


 Which Security Group is required for you to access custom reports 

  Report Writer User Based Security Group


  Can a role-based security tag to more than one org?
 Yes


  In Security Breach, whom should you contact?

 What are the steps to create Role Based Security?
 Steps-Org Role>>Maintain Org Role>>Attach the Role


 What are the two components of Workday Security?
Domain Security

Business Security


 How to disable Functional area?
Maintain Functional area


How to activate security policy?
    Activate pending Security Policy


What determines access to landing page?
Security


Which Report is used to see the Security Policy?
View Security for Securable Item
 
      Defined tasks and reports that are functionally similar
      Domains


This dictates who can view / modify data w/in the domain
Domain Security Policies


What dictates who can participate in the business process
Business Process Policies


Type of security group automatically assigned based on user’s job criteria
Job based security group


   Security policies designate permissions for security groups to view, or view and modify tasks within the domain
      Domain Security Policy


     Security Policies contain such securable items as initiation steps, step actions, and actions on the process as a whole
      Business Process Security Policy


Can you reassign a task to anyone?
No (It can be assigned to the users who have relevant security group in BP Security Policy).


Which dictates who can participate in BP?
Business Process Security Policy

------------ are assigned to users  based on administrative responsibility
  User-based

 ------------ are found as a related action off worker’s name
  User-based

 ----------- are assigned to users are based on criteria selected
  Job based

 ------------- are used to only approve business process management tasks; they do not determine task or report access and cannot initiate a business process
Job roles

 --------- report views all details about security group membership, security policies in which the group is used, the permissions it has and the functional area
  View Security Group

 ------- is automatically assigned based on criteria selected
Job based

 ------------- is used to restore inheritance in a child policy
Use Parent Permissions

Additional Reads: