• Accessibility Options:
  • Skip to Content
  • Skip to Search
  • Skip to footer
  • Office of Disability Services
  • Request Assistance
  • 305-284-2374
  • High Contrast
  • School of Architecture
  • College of Arts and Sciences
  • Miami Herbert Business School
  • School of Communication
  • School of Education and Human Development
  • College of Engineering
  • School of Law
  • Rosenstiel School of Marine, Atmospheric, and Earth Science
  • Miller School of Medicine
  • Frost School of Music
  • School of Nursing and Health Studies
  • The Graduate School
  • Division of Continuing and International Education
  • People Search
  • Class Search
  • IT Help and Support
  • Privacy Statement
  • Student Life

Logo: University of Miami (for print)

  • Search Site
  • Log In to Workday
  • Tip Sheets and Interactive Guides
  • Training Catalog
  • Training by Role
  • Kronos Training
  • All About the Workday Home Page
  • Company MSOM and Multi-Driver Worktags
  • Workday Releases
  • Workday Updates
  • Payroll Accounting Adjustment Guide (PDF)
  • Reports in Workday
  • Security Roles
  • FRS/FDM Conversion Tool
  • Workday Finance Presentations
  • Workday Business Process Approval Workflows (PDF)
  • Crosswalk Resources
  • Principal Investigator Resources
  • Workday Mobile
  • Super Users
  • Communications
  • Workday Presentations
  • Workday Finance Business Process Approval Workflows (PDF)
  • Lawson Crosswalk Resources

workday assignable roles

Review the Workday Security Role matrix below and learn about role visibility, assignments, and implications. Click here for more information on role-based training .

Quick Links: Finance Roles – HR Roles

Last Updated: 08/31/2022

Finance Security Roles in Workday

Department accountant – award analyst – cost center manager cost center sponsored program manager – department expense data entry specialist finance business process initiator – finance reviewer – gift reviewer grants manager –  principal investigator – department procurement data entry specialist grant reviewer –  senior business manager – senior business officer   .

Security roles are Workday designations that determine access to the initiation and approval of business processes as well as to data in Workday. Below is a comprehensive list of Workday Finance security roles at University of Miami.

HR Security Roles in Workday

Security roles are Workday designations that determine access to the initiation and approval of business processes as well as to data in Workday. Below is a comprehensive list of Workday HR security roles at University of Miami.

Employee-As-Self (Non-Exempt)

Supervisory organization, cost centers or cost center hierarchies, eligibility company, back to top.

University of Miami Split U logo

University of Miami

  • Workday Support:
  • [email protected]
  • 305-284-6565 305-284-6565
  • Academic Calendar
  • Alumni & Friends
  • Medical Center
  • Hurricane Sports
  • Parking & Transportation
  • social-facebook
  • social-twitter
  • social-youtube
  • social-instagram

Copyright: 2023 University of Miami. All Rights Reserved. Emergency Information Privacy Statement & Legal Notices

workday assignable roles

Workday Application Security Role Creation and Assignment Guide

The “Workday Application Security Role Creation and Assignment Guide” is a comprehensive resource for effectively managing security roles and groups in the Workday application. Workday is a widely used platform for human capital management and financial management, making security role management a crucial aspect of data protection and access control.

This guide offers a step-by-step approach to creating roles, establishing security groups, connecting them to domain security policies, and assigning them to users and organizations, ensuring data security and access efficiency.

TASK 1 – Role Creation:

Create a role:

Step 1: Log in to Workday.

workday assignable roles

Step 2: In the search bar, locate the task ‘Maintain Assignable Roles.’

workday assignable roles

Step 3: Access the ‘Maintain Assignable Roles’ screen, then click on the ‘+’ sign to create a new role.

workday assignable roles

Step 4: Enter the Role Name and enable the role for Company, Company Hierarchy, and Cost Center. Click ‘OK’ to create the role.

workday assignable roles

Step 5: To verify the role creation, search for the task ‘View Assignable Roles.’ Your newly created role should be available.

workday assignable roles

TASK 2 – Security Group Creation:

Step 1: In the search bar, find the task ‘Create Security Group,’ and a page will open.

workday assignable roles

Step 2: Enter the Type of Security Group and the Name of the security group. Note that there are various types of security groups in Workday, such as Role-based, job-based, location-based, and integration system security groups. For this exercise, select ‘Role-based security group.’ Click ‘OK.’

workday assignable roles

Step 3: A new page will appear. For the Assignable Role, select the role ‘BCR Test Invoice Clerk’ that was created in Task 1.

workday assignable roles

Click ‘OK’ to create the security group ‘BCR RBSG Invoice Clerk’ with the assigned role ‘BCR Test Invoice Clerk.’

TASK 3 – Assigning Security Group to the Domain Security Policies along with Permissions (View/Modify):

Note: Domain Security Policies involve assigning security groups with View or Modify access to specific functions or groups of functions.

Step 1: Search for and select the task ‘Domain Security Policies for Functional Area.’ A page/form will open.

workday assignable roles

Step 2: Choose the functional area ‘Supplier Accounts’ and click ‘OK.’

workday assignable roles

Step 3: The page displaying various functions within the Supplier Accounts functional area will open.

Step 4: Select the ‘Process: Supplier’ folder, which contains tasks related to Supplier Invoices.

workday assignable roles

Step 5: At the bottom of the page, click on ‘Edit Permissions.’

workday assignable roles

This will open the ‘Edit Permissions for Process: Supplier Invoice’ page. Scroll down to the security groups area.

workday assignable roles

Step 6: Click on the ‘+’ sign to add a security group. Select the ‘BCR RBSG for Invoice Clerk’ security group.

workday assignable roles

The ‘Modify’ checkbox should be selected automatically, and the ‘View’ checkbox should also be selected.

workday assignable roles

TASK 4 – Activating Pending Security Policy Changes:

To apply the security-related changes made above, you need to run the task ‘Activate Pending Security Policy Changes.’

workday assignable roles

Step 1: In the search bar, enter the task ‘Activate Pending Security Policy Changes.’

workday assignable roles

Step 2: A page will appear. Enter a comment and click ‘OK.’

workday assignable roles

Step 3: A confirmation page will appear, listing the changes being implemented. Select the ‘Confirm’ checkbox and click ‘OK.’

Step 4: Another confirmation page will indicate that the changes are now active.

workday assignable roles

TASK 5 – Assigning the Role to a User and an Organization:

Note: In this step, we assume you have already created an organization (e.g., ‘BCR Fox Auto’).

workday assignable roles

Step 1: In the search bar, enter ‘BCR Fox Auto’ to locate the organization.

workday assignable roles

Step 2: Click on the ‘Roles’ tab. This will display all available roles that have been enabled for the Company, including the role you created in Task 1.

workday assignable roles

Step 3: Assign the role to a user by selecting the user under the ‘Assigned To’ field.”

By following this guide, you’ll have the tools and knowledge to secure and streamline your Workday experience, safeguarding sensitive data and optimizing access control. As technology evolves, staying updated and adaptable in this security-conscious landscape is vital, making this guide a valuable asset for HR professionals, IT specialists, managers, and organizations committed to efficiency, security, and productivity in the Workday environment.

Leave a Reply Cancel Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Save my name, email, and website in this browser for the next time I comment.

Elevate Program logo

Your Role in Workday: Role-Based Security 101

We held a live Webinar for this Functional Overview on October 27, 2022. This session included a question and answer session, as well as an overview of many of the resources on this page.

You can watch the full webinar session by clicking the button below, or you can explore the resources on this page to get a brief overview of what was covered.

Watch The Full Functional Overview Session:

Security Roles and Permissions 101

  • A security role allows a person to see or do things within Workday.
  • Security roles are generally assigned to positions, and allow employees to complete the work required by their position.
  • Roles will be used to determine what Workday training employees are expected to complete.
  • All workers will have some self-service access in Workday.

What is Role-Based Security?

  • Role-Based Security is a collection of permissions operating within a business process which govern what actions you can take in that process.
  • Role-Based Security determines what data you can view, including reports
  • Workday clusters related business processes together, but we decide which roles will get access to which group of items!

Role-Based Security Is NOT:

  • A direct match between a role and your job title
  • One role with a comprehensive set of all your job duties
  • Meant to tell departments how to divide up work
  • Unchangeable

Benefits of Role-Based Security

  • Currently security is on a person; in Workday it’s on a position. 
  • Security roles are assigned based on what a position does.
  • The number of roles a person has will vary by department.
  • The roles on a position can change if needed.
  • Expect tighter control of data to protect the University.
  • Functional first: departments are driving which positions get which roles.

Featured Glossary Terms

Security Roles Security roles determine who can do what actions (i.e. initiate, review, approve) on a particular task or business process. Security roles also control what data a user can view. Examples of security roles are HR Analyst, HR Partner, Recruiter, Costing Specialist, and Cost Center Manager. 

Approve Approve is an action in a business process that designated security role holders complete to progress the event to the next step. In an approval step, you cannot modify the initiator's selections, only Approve or Send Back.

Approval Chain An Approval Chain is a vertical sequence of approvals, starting with users in the assigned security group. The chain continues until it reaches the top or meets exit criteria. A common exit condition is requiring approval from only two workers in the approval chain.

Delegations Delegation reassigns your business process actions to another user, allowing actions to be performed on your behalf. 

Initiate Action to be taken to kick-off or begin a business process in Workday.

Supervisory Organization Supervisory Organizations (Sup Orgs) group workers into a management hierarchy. Jobs, positions, and compensation structures are associated with sup orgs, and workers are hired into jobs or positions associated with a supervisory organization.

Technology Insights Blog

4 Ways to Effectively Design and Configure Workday Security

workday assignable roles

Given the size and complexity of most organizations, effectively managing user access to Workday can be challenging. Defining adequate security policies and requirements will enable a clean security role design with few or no unmitigated risks of which the organization is not aware. It is important to have a well-designed and strong security architecture within Workday to ensure smooth business operations, minimize risks, meet regulatory requirements, and improve an organization’s governance, risk and compliance (GRC) processes.

Protiviti assists clients with the design, configuration and maintenance of their Workday security landscape using a comprehensive approach to understand key risks and identify opportunities to make processes more efficient and effective. We evaluate Workday configuration and architecture and help tailor role- and user-based security groups to maximize efficiency while minimizing excessive access. In this blog, we share four key concepts we recommend clients use to secure their Workday environment.

Four Ways to Effectively Design and Configure Workday Security

1. Adopt Best Practices | Tailor Workday Delivered Security Groups

Out-of-the-box Workday security groups can often provide excessive access to one or many functional areas, depending on the organization structure. Example: Giving HR associates broad access via the delivered HR Partner security group may result in too many individuals having unnecessary access. To achieve best practice security architecture, custom security groups should be developed to minimize various risks including excessive access and lack of segregation of duties. Developing custom security roles will allow for those roles to be better tailored to exactly what is best for the organization.

2. Establish Standardized Naming Conventions | Enhance Delivered Concepts

Workday security groups follow a specific naming convention across modules. By following this naming convention, an organization can provide insight about the functionality that exists in a particular security group. Generally, conventions help system administrators and support partners classify and intuitively understand the general function of the security group. The table below contains the naming conventions of Workday delivered security groups in order of most to least privileged:

Note that these naming conventions serve as guidance and are not always prescriptive when used in both custom created security groups as well as Workday Delivered security groups. For example, the out-of-the-box Workday HR Partner security group has both entry and approval access within HR, based upon the actual business process.

3. Restrict Sensitive Access | Monitor Access to Critical Functions

Sensitive access refers to the capability of a user to perform high-risk tasks or critical business functions that are significant to the organization. Depending on the organization, these range from the modification of system configuration to creating or editing master data. Sensitive access should be limited to select individuals to ensure that only appropriate personnel have access to these functions. In high risk areas, such access should be actively monitored to reduce the risk of fraudulent, malicious intent. Implementer and Correct action access are two particularly important types of sensitive access that should be restricted.

  • Implementer is a security group that has very powerful access, typically granted to the system implementer personnel who set up the system. This security group can configure and modify system behavior in ways that are not available to users with other administrator access. Implementer access should be closely monitored to ensure that users who do not require this access do not have it.
  • The Correct business process action is a highly privileged function that allows users to alter an instance of a business process. Users with this access can modify the transaction at any point in the workflow, even a completed transaction, without requiring further approval. Best practice is to disallow the Correct action in a business process or to only assign it as an administrative privilege.

 4.  Eliminate Intra-Security Group Conflicts| Minimize Segregation of Duties Risks

Access provided by Workday delivered security groups can result in Segregation of Duties (SoD) conflicts within the security group itself, if not properly addressed. This can create an issue as an SoD conflict may be introduced to the environment every time the security group is assigned to a new user. No organization is able to entirely restrict sensitive access and eliminate SoD risks. They must strike a balance between securing the system and identifying controls that will mitigate the risk to an acceptable level. Custom security groups should be developed with the goal of having each security group be inherently free of SoD conflicts. This will create an environment where SoD risks are created only by the combination of security groups. With this structure, security groups can easily be removed and reassigned to reduce or eliminate SoD risks.

Workday Security is not a “One Size Fits All” Approach

Securing the Workday environment is an endeavor that will require each organization to balance the principle of ‘least privileged access’ with optimal usability, administrative burden and agility to respond to business changes. Regardless of the school of thought adopted for Workday security architecture, applying the principles discussed in this post will help to design and rollout Workday security effectively. This can go a long way to mitigate risks and reduce the ongoing effort required to maintain a stable and secure Workday environment.

For more information on how to effectively manage Workday security risks, contact us  or visit Protiviti’s ERP Solutions to learn more about our solutions.

workday assignable roles

Managing Director Enterprise Application Solutions

workday assignable roles

Austin Horton

Senior Consultant Technology Consulting - Enterprise Application Solutions

workday assignable roles

  • Pursuing Cloud Migration and Adoption? Read This First.

Cloud adoption and migration for enterprises have grown significantly in the past two decades. Industry trends project that cloud adoption and migration will continue to grow steadily over the next couple years. In a global survey commissioned by...

workday assignable roles

Know the Business Continuity Risks and Solutions When Investing in SaaS

We often hear our clients ask what steps to take to develop a Software as a Service (SaaS) strategy for IT environments. Both the CIO and business owners recognize the benefits of SaaS solutions, which are readily available and often focused on a...

workday assignable roles

Workday Out-of-the-Box Reporting Fundamentals

Workday’s object-oriented architecture and robust reporting engine enables financial and human capital data management and analysis within a single platform, unlocking possibilities for powerful new insights. To a new user, the complexity can feel...

workday assignable roles

Subscribe to Topics

Protiviti Technology Follow

Protiviti leverages emerging technologies to innovate, while helping organizations transform and succeed by focusing on business value.

ProtivitiTech

As a @Salesforce partner, @Protiviti was selected for a 10-week pilot to showcase its unique value proposition, expertise, and collaborative strategies for driving client success via Salesforce. #ProtivitiTech #TheVectorEffect #SalesforcePartners

Discover how Protiviti helps SAP users leverage advanced analytics through robust data management practices and how partnering with our SAP experts can set your organization up for long-term success. https://ow.ly/uaq850QGLVi #ProtivitiTech #SAP #SAPinsider

Protiviti is a proud silver sponsor of 2024 Tampa Government Contracts Week. Perry Keating will speak on the #Cybersecurity panel on Monday, March 11 at 2 pm. Register today using discount code "20SPONSORFL24" to receive 20% off your registration! https://ow.ly/W2TV50QGtYa

Discover why #Cloud security policy implementation should fulfill three types of security guardrails—and how Protiviti’s new automated policy enforcement bundle Cloud Shepherd can help streamline the process. https://ow.ly/QFzx50QGJMl #ProtivitiTech

Learn more about QMOD language from Classiq, how to try it for free, and how it makes creating working circuits easier in the latest Post-Quantum World episode featuring guest Amir Naveh. https://ow.ly/xSav50QGjOw #ProtivitiTech #QuantumComputing

Recent Posts

  • Strategic Shifts for SAP Organizations: Unraveling Protiviti’s Finance Trends Survey
  • AI Is a Double-Edged Sword of Business Opportunity and Cybersecurity Risk for E&U Industry
  • System Integrator or Security Specialist: Who Should Be Responsible for Implementing S/4HANA Security and Controls?
  • IAM in Operational Technology: How and Where to Make it Work
  • 2021 Tech Priorities
  • Applications
  • Business Continuity and Resilience
  • CIO Tech Transformation Series
  • Consumer Products and Services
  • Cybersecurity
  • Data and Analytics
  • Emerging Technologies
  • Energy and Utilities
  • Finance Transformation
  • Manufacturing and Distribution
  • Risk and Compliance
  • Tech Transformation
  • Technology Resilience
  • Technology, Media & Telecom
  • Top Risks Survey
  • Vulnerability/Incidents

workday assignable roles

Subscribe to blog

  • Protiviti Home
  • Consumer Products & Services
  • Financial Services
  • Skip to primary navigation
  • Skip to main content

Managing Security Role Assignments for an Employee

This job aid outlines the process for HR Contacts, HR Partners, and Organization Partners to view, assign and remove security roles on an Employee’s position.

Important Information

Getting started.

  • Security roles are assigned on the position, not the Employee. Therefore, assigned roles will stay with the position when vacated by an Employee and will be inherited by the next Worker in the position. Refer to the reference guide Assignable Roles for Security in Workday for definitions of security roles used in Workday.
  • After role assignments are submitted, they will route for approval to the designated Role Maintainer who is either a Security Partner within your organization or a Security Administrator with Workday Services.
  • Security Partners should regularly audit assignments using monthly security logs and a yearly audit.
  • Navigate to the Employee’s Worker Profile.

An example worker profile. display of related actions > security profile > assign roles-add/remove

  • Effective Date . Today’s date will populate. IMPORTANT : To avoid downstream impacts, Workday Services recommends you do NOT edit the Effective Date.
  • Copy Role Assignments from . This feature allows you to choose security role assignments from another Employee’s position. You will be able to review the assignments prior to finalizing. Enter the UIN or name of the Employee with these security roles.

assign roles-add/remove with effective date shown (defaulted by Workday)

Note : You will be able to make any adjustments on the next screen.

  • Select OK .
  • Role Enabled For . Enter the name of the Supervisory Organization where the role will be assigned. Do NOT use the dropdown menu on the right.
  • Role . Select the security role to be assigned.
  • Update Later Dated Assignments . Do NOT modify this field.
  • Role Assignee Effective From . Leave the date populated by Workday.

assign roles-add/remove table with new role highlighted

  • Enter any comments, as needed.
  • Select Submit and Done .

Navigate to the Up Next tab for the next steps in the process.

  • Approve Security Role Assignments

The Role Maintainer will receive an Inbox task to approve Assign Roles.

view of Security Partner's inbox task: assign roles

Note : Workday Services recommends you enter a comment if declining.

This completes the Managing Security Role Assignment business process.

Workday HCM System | Security Roles in Workday Workday Security Roles Inheritance in Organizations

A Workday security group is a group of users who need the same access, such as an HR partner or role-based Workday security group. Roles are always assigned to an organization, and in supervisory Workday organizations, roles can be assigned to unfilled positions. If a role is not filled, it is inherited from the superior organization.

For example, if a position is unfilled, the manager of the supervisory Workday organization is assigned to the manager of the Workday supervisory organization, which is the manager of IT sales in Asia Pacific.

The Workday manager’s name is Jack, and the role is currently occupied by a person named Prin. If the position is framed up, it will be inherited by Praveen, who will act as the Workday manager.

This concept of Workday roles and positions is crucial in managing Workday security and ensuring the Workday security of sensitive information.

Importance of Role Assignment in Organizations

This topic discusses the importance of assigning roles to specific positions or individuals within an organization. It is the use of single assignment roles, which allow for only one position to be assigned to a role.

This is useful for supervisory organizations, where multiple people can be assigned to a role.

However, the Workday advantage of having multiple people assigned as HR partners is that they can take action if a task is waiting on them.

Managing Users in a Security Group: Benefits and Best Practices

A security group is a group of users with the same access, which can be beneficial in certain situations. However, it is important to note that assigning roles to multiple individuals does not necessarily mean that all of them must take action.

Instead, assigning roles to specific individuals can help maintain consistency and efficiency within the organization.

workday assignable roles

Workday Emergency Contact Information Handbook: Granting Modify Access to Security Policies and Permissions

Coming to the limitations of modifying emergency contact information in Workday, a system used for managing employee information. It explains that only the employee has the ability to change their contact information, not others.

The security measures that can be used to view and modify the data, such as the Workday report field for emergency contacts. The Workday integration permissions that allow the manager to view and change the data, but they are not allowed to do so from the UI.

The Workday discusses the need for the manager to have certain permissions to edit the emergency contact information, such as modified permissions.

From the above reading it can be concluded by mentioning the importance of using Workday’s terminologies when discussing the system, as it can significantly impact interviews.

For the process for granting modify access to a security policy.

Users navigates to the related actions and finds out that the policy is not enabled. They then enable the policy and confirm its activation.

The policy has pending changes, so they change the policy permissions. The manager is then given modify access, and they can now make changes to the policy information.

The manager is then able to modify emergency contacts. The security group is then able to view the report on the security group, and the emergency contacts report is found. Users can then access the security policy by clicking on the security policy field.

This process is used to change security policy and find out about the security. It also suggests identifying any field that has been used in eligibility criteria or assignments.

The importance of updating security policies and permissions to ensure only authorized individuals have access. The iterative process of security, which involves trial and error and requires time and testing.

Different types of security groups, including role-based, user-based, and process-maintained groups. These groups are Workday work-day delivered and can be modified by adding permissions to domain security policies.

The Tutorial emphasizes the importance of worker assignment to these groups. by discussing how workers are assigned to roles based on related actions, roles, and roles, and how they are indirectly associated with the role-based group. They also discuss how workers are assigned to user-based groups manually and directly to users.

User-based security groups are assigned directly to users, which requires manual intervention by the Workday security administrator. Role-based security groups involve assigning a worker to a position, role, or security group, granting certain permissions. User-based security groups are straightforward and can be edited directly.

Process-maintained security groups are Workday-delivered and include users based on business processes like hiring, termination, transfer, and retirement. Workday assigns workers to these groups based on the system’s decisions, such as hiring, termination, transfer, and retirement. Permissions for these groups are the same as domain and business process security policy permissions.

There are two Workday versions of these security groups: one is self, which includes all instances of the group, and another that includes all instances of the group. These groups are Workday-delivered and membership to them is controlled by Workday. It is important to be aware of these security groups as they may require changes, updates, or permissions.

Harsha

New Technology, let's explore together!

workday assignable roles

Workday Trainings is here for you to provide the caliber and adaptable online classes with experienced instructors to make these Workday technologies easy to learn for you.

Quick Links

  • All Courses

Other Pages

  • Help Center
  • Parent Community

Location Address

workday assignable roles

South wales

Copyright © 2024  . Workday Trainings   . All Rights Reserved.

  • Privacy Policy
  • Terms & Condition

SOAIS is a leading enterprise IT solutions

  • UiPath Services
  • Worksoft Test Automation
  • Tricentis Test Automation
  • Selenium Test Automation
  • SAP Services
  • Workday Services
  • Oracle Cloud Support Services
  • Peoplesoft Support
  • Case Studies
  • Knowledge Base
  • Tools & Accelerators
  • Gartner Articles

Assign Roles to user using Workday EIB – Inbound

workday assignable roles

Recently, we have explored the capabilities of assigning roles to an employee or a position in Workday using EIB. Assign Roles web service is used to assign roles to positions or workers. This web service replaces the Assign Organization Roles web service, which is being deprecated. Following are the details:

Equivalent Workday Task – Assign roles from the related actions menu of the Worker Profile or the Position Restriction.

Tips to populate input files:

  • Spreadsheet Key: Use a unique value for each Event Target Assignee that we are updating.
  • If we want the role assignment to be effective immediately, leave it blank to default to today’s date or manually enter today’s date. 
  • We can also specify a future date if you don’t want the role assigned immediately.
  • Don’t use a past date; We should not backdate the role assignment.
  • Event Target Assignee : We can populate this field with Position ID or EMPLID if we want to assign roles similar to Event Target Assignee (say worker or Position X) to worker/position (Say A, B, C) we need to list those workers/positions (A,B,C) also into Assignees to Add column
  • Order Type Reference:  Although it shows as required, it should be left blank
  • Update Later Dated Assignments : We will likely want to set this field to Y so Workday doesn’t inadvertently drop the role assignment if there are any future-dated assignments for the role.
  • Assignees to Add+:  If we are assigning roles, make sure we populate this field. Otherwise, no roles will be assigned. If we are removing roles, make sure we populate the  Assignees to Remove+  field.
  • Remove Existing Assignees for Assignable Role on Role Assigner : Set to Y if we need to remove all role assignments for a given role and

Also please note that the reference ID types in row 4 of the EIB input file are populated with the first valid entry (based on alphabetical order). Many of the assignee fields are using reference ID type Academic_Affiliate_ID We need to change the values to relevant valid entry.

Assignable Role on Role Assigner

Common Issues and Errors

The EIB completes successfully, but you don’t see new the role assignments.

This issue occurs if we have populated a role with older effective date, or failed to load Assignees to ADD+ filed in the template. Also need to make sure that business process Assign roles is completed successfully.

There is no option to launch the integration: This is most likely security-related issue on Assign Roles web service.

The EIB issues these errors:

  • Assignable Role is not valid
  • The entered information does not meet the restrictions defined for this field (Assignable_Role_Reference)

Either role is not available or REFERENCE_ID is not populated correctly.

How to Recover from a Bad Load

We can add and remove assignees in the EIB input file. The rescind option is not allowed for this EIB (it is supported only when the assign roles process is used as a sub-process in other business processes). If we need to un-do a role-assignment, we can re-run the EIB to remove the role-assignment.

Leave a Reply Cancel Reply

Save my name, email, and website in this browser for the next time I comment.

Facebook

Privacy Overview

Leave us your info.

The countdown to NASA’s Jupiter mission is on. This JPL engineer is helping it happen

Mechanical engineer Steve Barajas in a white clean room suit and mask

  • Show more sharing options
  • Copy Link URL Copied!

Think of meticulously handcrafted objects and certain things come immediately to mind: fine art, exotic cars, luxury timepieces.

But Pasadena native Steve Barajas spends his days building a bespoke item that’s on another level entirely: NASA’s Europa Clipper.

logo of a coffee mug with a clock dial and a sun: My L.A. Workday

What do you do for work?

That’s the question My L.A. Workday answers. The series takes you inside a day on the job with some of the city’s most fascinating people. Interviews are edited for length and clarity.

The 13,000-pound behemoth, with a solar-array wingspan the length of a basketball court, is one of the agency’s most ambitious efforts. It’s on an October countdown to launch to Jupiter and its moon Europa, atop a SpaceX Falcon Heavy rocket , to find out if life exists in the deep ocean believed to lie beneath Europa’s icy exterior.

The central body of the $5-billion Europa Clipper arrived in June 2022 at the Pasadena campus of NASA’s Jet Propulsion Laboratory for the painstaking final assembly of components shipped from across the U.S. and Europe. That’s where Barajas comes in.

Barajas, 35, is a mechanical engineer leading a team that, in coordination with other JPL specialists, installs crucial hardware for the ambitious mission. Barajas describes some high points with a parental flair: There’s the magnetometer that could confirm whether an ocean exists beneath the Europa ice; the mass spectrometer that will analyze gases in Europa’s atmosphere; the infrared cameras that will map the moon’s surface composition, temperature and roughness; and the solar panels that will help power the spacecraft instruments.

A model of NASA's Europa Clipper space probe

The project’s momentum to liftoff didn’t spare the Europa Clipper team when JPL in early February laid off 530 people, or about 8% of its workforce, because of uncertainties over congressional funding for NASA. Although the job cuts, the second round this year, were felt “across the NASA family,” NASA Administrator Bill Nelson said, “the Europa Clipper mission will proceed as planned.”

An illustration of NASA's Europa Clipper spacecraft flying near the icy moon, with Jupiter in the background.

Science & Medicine

How NASA’s Europa Clipper will survive its trip to Jupiter’s hostile moon

Searching for the ingredients for life on Europa will be a challenge for NASA’s Europa Clipper spacecraft. Surviving the high radiation of the icy moon will be even harder.

Oct. 18, 2023

In his official NASA bio, the UC Berkeley graduate recalls his childhood fascination with space. “As a kid, I remember passing the sign along the 210 Freeway that read ‘NASA-JPL Next Exit,’ thinking it was so cool that NASA was so close.”

Barajas, who joined JPL in 2016 from Aerojet Rocketdyne, said his work has taught him the art of delayed gratification. If the Europa Clipper launches on schedule from the Kennedy Space Center, Barajas will have to wait 5½ years for it to arrive at Europa, about 488 million miles from Earth, where it will perform dozens of flybys of the moon to collect data.

“I’m working on a spacecraft that will hopefully find something profound in the future, and working with people who share the same passion,” he said.

Santa Monica, CA - Dogs and people socialize at Dog PPL, a members-only club in Santa Monica. It's billed as a private social club for people and their dogs, with regular events and lounge areas and a cafe/bar. (Luis Sinco / Los Angeles Times)

At this exclusive members-only club, you can poop anywhere, but no humping, please

Private dog parks are in high demand as affluent city dwellers seek elusive green spaces for their pets to socialize and roam off-leash.

Dec. 12, 2023

When JPL finishes the buildout, Barajas will be part of the team that flies to Florida in May for launch preparations, with liftoff scheduled for as early as Oct. 10 from Kennedy Space Center in Cape Canaveral.

The Times spent a day with Barajas on the job late last year. The interview was edited for length and clarity.

Barajas starts his day studying a pile of activity reports from the previous day’s work to create a tactical schedule for the mechanical engineers on his team.

Today is a big day for the Europa Clipper team. They’ll be testing the craft’s thermal pumping system, the last major addition to the spacecraft’s vault, a thick-walled aluminum alloy box that holds the spacecraft’s “brain”: its electronics and computers.

Inside look at NASA's Europa Clipper spacecraft's wires and tubes

“The thermal pump is the heart of the spacecraft,” pumping fluid through tubing to control the craft’s temperature, Barajas said. The daylong effort is hazardous because of the high pressure used to test the system with helium, a nonflammable gas.

Mechanical engineer Steve Barajas

The Europa Clipper’s tall silvery core stands in JPL’s Space Assembly Facility in High Bay 1 clean room , surrounded by temporary scaffolding. In a nearby conference room, Barajas represents the mechanical engineering team as he compares notes for the day ahead with colleagues from the electrical engineering and systems teams.

National Weather Service meteorologist Rose Schoenfeld works at the National Weather Service facility in Oxnard on August 19, 2023, the day before Hurricane Hilary is expected to hit Southern California. (Photo by Ringo Chiu / For The Times)

For this L.A. meteorologist, Hurricane Hilary makes for a ‘once-in-a-lifetime’ day at work

As a meteorologist, Rose Schoenfeld’s job is to keep the public informed of severe weather. For her and her colleagues, Hurricane Hilary is ‘a once-in-a-lifetime kind of event.’

Aug. 20, 2023

“Some of what we are discussing are small details. It usually isn’t a massive revamp of the plan,” Barajas said. “It’s trying to get everything organized so that we can provide very clear direction when we meet with the rest of the teams at 7:30.”

Mechanical engineer Steve Barajas dons protective coveralls

Before any work on the spacecraft begins, Barajas and his colleagues have to don the white protective coveralls known as bunny suits. Barajas will have to repeat the procedure three times before the day ends.

Collegial chatter abounds because some people entering the clean room for the first time need help with the process.

Mechanical engineer Steve Barajas leans over to close the leg of his clean room outfit

“Every time we enter the clean room, we have to first put on the bunny suit, which is a very ugly one-piece jumper,” Barajas said. “Empty your pockets; no phones or watches. Shoe covers go on your feet, then there are boots that go on top of those. If you have a beard; there’s a mask to wear for that. Then there’s a face mask and a hood that’s like a fabric helmet goes over that. Then you put on the bunny suit without letting it touch the ground. Then there’s tape on all of the separate parts, joining the legs to the shoes, gloves to the sleeves, etc.”

The process must be repeated after a worker leaves the clean room for lunch or a bathroom break — “It’s one of the daily downsides of the job” — so veterans know, “you’re not able to hydrate as you would normally.”

Next, there is something that looks like a shower stall, buts it’s dry air being blasted at the occupant, hard enough to feel like a wind storm.

Los Angeles, CA - September 22: At sneaker store Cool Kicks, on Melrose Avenue, in Los Angeles, CA, there are more than 2,000 shoe options, with the majority being Nike, like this Jordan 4 x Union "Guava," selling for around $750, held by a customer, Friday, Sept. 22, 2023. Rami Almordaah, a shoe buyer at Cool Kicks on Melrose Avenue, has amassed over one million subscribers on his YouTube channel and nearly two million on TikTok ( Ramitheicon ), recording his buys done at the store. (Jay L. Clendenin / Los Angeles Times)

Are your sneakers knockoffs? He can tell by the smell

Rami Almordaah is chief authenticator at sneaker resale store CoolKicks. It’s his job to identify fakes and drive hard bargains for sneakers that collectors want to sell.

Nov. 16, 2023

On one wall of the clean room hang plaques commemorating missions that date back 63 years, to the Ranger 1 moon mission, when engineers worked on spacecraft in street clothes. But this is not 1961, a time when earthlings weren’t concerned about spreading their biological junk off planet.

“Planetary protection has evolved,” Barajas said of the strict work requirements he has to follow every day. “No one wants to be the person responsible when extra-terrestrial life is finally found and it turns out to be something we brought there from earth.”

Engineers and technicians work on the Europa Clipper spacecraft, which is surrounded by scaffolding.

Inside the clean room, engineers and technicians are making sure all of the fittings on the thermal pump are sufficiently tight.

There is no chatter, no small talk. Everyone is looking intently at the work being done, a level of scrutiny that continues during the testing process. Barajas is there to ensure that members of the thermal team conducting the test have everything they need and the work is going smoothly.

“We have detectors here on the clean room floor that will read whether anything is seeping out. We do this with helium,” Barajas said. It has to be below a certain rate loss. “There will always be some seepage but as long as it’s not too much, we’re OK.”

A JPL employee inspects the Europa Clipper spacecraft

There are two thresholds for success. One is a vacuum test using a wand spraying helium to see if it it is being sucked into the system. The other is the high-pressure test in which helium is pumped through the system to see if gas leaks out.

Any significant leaks will interrupt the tight choreography of the spacecraft’s assembly and testing schedule, less than a year away from launch time.

132388Rancho Cucamonga, CA - Mike Lindskog, the "Voice of the Rancho Cucamonga Quakes," a Single-A farm team affiliated with the Los Angeles Dodgers, fills out scorecards in his broadcast booth before a game at LoanMart Stadium on Thursday, Sept. 14, 2023. (Luis Sinco / Los Angeles Times)

‘I live and die by adrenaline.’ A day with the voice of the Dodgers’ Rancho Cucamonga Quakes

Ever wonder what a baseball broadcaster does? Inside the booth with Mike Lindskog, the voice of the Rancho Cucamonga Quakes of the Dodgers’ minor league team system.

Oct. 10, 2023

“We are physically putting the spacecraft together. We are the end of the line,” Barajas said, trying to explain the serious atmosphere in the room. “It’s up to us to verify that the parts we have been sent are working the way they should. Humans aren’t infallible. We’re always looking over each other’s shoulder to make sure we’re doing the job right.”

“I think that’s where the stress comes from, right? That we feel the pressure and the burden of building this vehicle that has been the life’s work of some and years of work for many others.”

"High Bay Bob," a bunny suit-clad mannequin in the High Bay Clean Room harboring the Europa Clipper

It’s lunchtime. You might think that the pressure of tight deadlines would cause Barajas and others on the project to push through to stay on schedule. Bad idea, Barajas said.

“We always make time for lunch,” he said. “What we don’t want is to have hungry people on the floor. Sometimes we cycle people in and out so that the work can continue. Other times we just take a 45-minute break, so the folks can stay focused on the floor when we are having a long day like this.”

Children look through a window into the clean room where JPL where the Europa Clipper spacecraft is assembled.

Barajas steps out of the clean room to catch up with phone calls and email.

“In my particular role, the brunt of the day is a lot of behind-the-scenes work,” Barajas said. “To keep things moving, looking ahead to the next job.”

There’s the occasional startling interruption of tour guides speaking in the hall outside his office as they lead groups through JPL’s Spacecraft Assembly Facility. The main attraction is the window into the clean room, where tours can see the spacecraft itself.

“There’s a constant stream of tours during the day. It’s like working in a fishbowl,” Barajas laughs.

Los Angeles, CA - July 14: Henri Laborde an art restorer works in his DTLA studio on Friday, July 14, 2023 in Los Angeles, CA. (Jason Armond / Los Angeles Times)

How fasting, tai chi and a rooftop garden help this art restorer reach peak concentration

Art restorer Henri Laborde will repair art from Sotheby’s, Christie’s — and your living room shelf. Here’s how he stays focused on the delicate work.

Sept. 28, 2023

The work day comes to the 3 p.m. change of shift. But Barajas isn’t knocking off; he’s back to the clean room as testing continues. Barajas needs to make sure that the second shift is able to pick up where the first shift left off.

Engineers and technicians under a high gain antenna work on NASA's Europa Clipper

The tests are done and the teams determine that there were no leaks. But there isn’t even the briefest of celebrations for this achievement.

“We’ve got so much still to do. Interim steps don’t really get much of a response from us,” Barajas said.

Barajas and colleagues turn their focus to the next few days, when they will fill the system with freon and then close the spacecraft’s aluminum vault for good.

“That will be a milestone, not just for us, but for the whole project,” he said.

That might even get a high-five.

More to Read

Pasadena, CA - October 03: Inside mission control room at the Jet Propulsion Laboratory on Tuesday, Oct. 3, 2023 in Pasadena, CA. (Brian van der Brug / Los Angeles Times)

Budget cuts to Mars Sample Return mission prompt hundreds of layoffs at JPL

Feb. 7, 2024

Los Angeles, CA - January 30: The retired space shuttle Endeavour is lifted into the site of the future Samuel Oschin Air and Space Center at California Science Center on Tuesday, Jan. 30, 2024 in Los Angeles, CA. (Ringo Chiu / For The Times)

Space shuttle Endeavour is lifted into the sky, takes final position as star of new museum wing

Jan. 30, 2024

Los Angeles, CA - January 26: The space shuttle Endeavour is wrapped in protective shrink wrap and is parked next to external fuel tanks and is anticipated to be lifted by a 450-foot crane and mated to there tanks in full launch position in the next few days, weather permitting at the future Samuel Oschin Air and Space Center in on Friday, Jan. 26, 2024 in Los Angeles, CA. (Brian van der Brug / Los Angeles Times)

Space shuttle Endeavour soaring into place at final museum home

Jan. 27, 2024

workday assignable roles

Ronald D. White is a general assignment reporter for the Los Angeles Times whose work includes leadership profiles, innovations in manufacturing, retail and business trends.

More From the Los Angeles Times

Rome, Italy- Elderly woman cashier selling a man fresh produce in Campo de' Fiori, the largest and oldest outdoor market in Rome. It is located south of Piazza Navona. (Photo by: VW Pics/Universal Images Group via Getty Images)

Opinion: ‘Work longer’ is no solution for people who can’t afford to retire

Arcadia, CA - February 14: Karen Kropp locates books for a customer at The Book Rack, a bookstore she has owned for nearly two decades, on Wednesday, Feb. 14, 2024 in Arcadia, CA. At the end of the month she is closing the bookstore doors and moving to Albuquerque with family. (Dania Maxwell / Los Angeles Times)

She poured her heart into Arcadia’s Book Rack. Now the small bookstore is closing

A conductor in a suit standing in front of an orchestra

Company Town

Hollywood musicians reach tentative deal with major studios in ‘watershed moment for artists’

Feb. 23, 2024

workday assignable roles

For Billie Eilish, performing at the Oscars is ‘terrifying, horribly terrifying’

  • Workday Policies

User-Based Security Role Assignments

User-Based roles are those roles that are assigned to specific users in Workday. These roles are not attached to positions and must be assigned to the individual occupying the position. User-based roles are unconstrained and do not limit access to any particular subset of workers in Workday.  User-based roles include (but are not be limited to) auditor-type roles that provide access to subsets of Workday data and system administration roles.

Approval and Assignment of User-Based Roles

  • User-based roles are requested using the “Workday@Penn Role Assignment Request Form”.
  • The request form must be signed by the individual requesting access and be accompanied by a signed Workday@Penn Confidentiality Statement.
  • All requests for User-based roles must be approved by the Vice President for Human Resources, the Vice President for Finance and Treasurer, and the Directory of Workday Operations.
  • Requests for user-based roles for users outside of the central administrative offices must also be approved by the School or Center’s HR Partner and Security Administrator.
  • User-based roles assigned to employees of third-party service providers must also be approved by the owner of the vendor relationship, and those employees or the vendor must agree to our confidentiality, privacy, and security terms.
  • Requests will be reviewed and entered into Workday by the Workday Security Administrator(s). The request form will be signed by the Workday Security Administrator and maintained.

Monitoring of User-Based Role Assignments

  • The Workday Security Administrator and Director of Workday Operations will be responsible for reviewing and auditing user-based role assignments on a regular basis.  This review will ensure that the list of users on each group are appropriate and expected.
  • This review of user-based roles shall be done no less frequently than quarterly and may be done manually using Workday reporting, or in an automated manner using testing/auditing tools.
  • User-based role assignments of employees of third-party service providers will be verified with owner of the vendor relationship.

Removal of User-Based Role Assignments

  • Users that have user-based role assigned will be monitored for changes to their position in Workday on a weekly basis. 
  • The Workday Security Administrator will remove user-based role assignments from any user that has moved positions and is no longer in the position that would have warranted the role.  The approvers of the original request will be consulted as necessary.
  • The Workday Security Administrator or Director of Workday Operations may remove user based role assignments at any time without warning if any malicious activity or University policy violation is detected or suspected.  User based role assignment may be removed upon request from appropriate offices, including but not limited to: ISC Security, the Office of Audit, Compliance, and Privacy, Division of Human Resources, Office of General Counsel, and the Division of Finance.  
  • Terminated workers will automatically have their user-based role assignments removed during the termination business process in Workday.
  • User-based role assignments for employees of third-party service providers will be removed upon request from the owner of the vendor relationship.  It is the responsibility of the owner to inform the Workday Security Administrator of any changes.

Provision for System/Module Implementation

  • There may be certain times when it may be necessary to assign user-based security to a larger than normal number of users.  This may occur at system implementation, during the implementation of new functionality or modules, or as a result of a Workday release.
  • In these cases, a list of users being assigned to each security role can be provided to the approvers listed above for bulk approval.  In this case, the list of users and the approval shall be maintained in the same manner as the request forms.

Penn Employee Solution Center [email protected] or (215) 898-7372

Quick Links

  • Training Tip Sheets

IMAGES

  1. PPT

    workday assignable roles

  2. PPT

    workday assignable roles

  3. Implementing Workday

    workday assignable roles

  4. PPT

    workday assignable roles

  5. PPT

    workday assignable roles

  6. Assign Roles to user using Workday EIB

    workday assignable roles

VIDEO

  1. Assignable Roles in Workday

  2. Assign Roles Manager in Workday

  3. Assign Roles Manager in Workday

  4. Assign Roles,Create position in Workday part 2

  5. Assign Roles,Create position in Workday part 2

  6. Assign Roles,Create Position in Workday part 1

COMMENTS

  1. Security Roles

    Last Updated: 08/31/2022 Finance Security Roles in Workday Department Accountant - Award Analyst - Cost Center Manager Cost Center Sponsored Program Manager - Department Expense Data Entry Specialist Finance Business Process Initiator - Finance Reviewer - Gift Reviewer

  2. Role-Based Security Role Assignments

    Role-based security assignments are those that are assigned to positions in Workday. These roles are not attached to users, but to the positions they are hired into within Workday. Role-based assignments are constrained, and limit access based on the organization (s) assigned.

  3. Assignable Roles

    Workday at the U of A Workday Training Assignable Roles Request to Add/Remove Security Roles Security role related requests may be submitted via the 'Create Request' process in Workday. For instructional assistance view the Quick Reference Guides. The security lists provided below represent the most common assignments for users.

  4. PDF Design Decision Guide

    DECISION GUIDE: ASSIGNABLE ROLE ASSIGNMENT MODEL REVIEW: Assignable Role assignments determine who supports whom (who can I see) in Workday. Considerations . CONFIGURATION . This is a high-level review of the configuration requirements foAssignable Roles and Assignments. Nor te any design decisions or comments in the table below.

  5. Securing Sensitive HR Data in Workday: The Importance of Assignable Roles

    In Workday, "Assignable Roles" are used to define different levels of access and security permissions for various HR-related tasks and processes within the platform. These roles help ensure...

  6. Assign Roles

    From the Workday Home page: Search for and select the person whose position you wish to assign roles to The Worker Profile will display. Click the Actions button and select Security Profile > Assign Roles Release 30 4. Select the correct the correct Worker Effective Date and verify that is displayed, then click OK 5. Click OK 6.

  7. Security Managing Role Assignments HR Partners, HR Practitioners

    To assign a role to an employee: Enter the employee's name in the search field. Click the employee's name. The employee's profile displays. Click the Relation Actions button under the employee's name. Scroll down the list of actions and select Security Profile. A list of options will display. Assign Roles - Add/Remove. 8.

  8. Workday Application Security Role Creation and Assignment Guide

    Step 1: Log in to Workday. Step 2: In the search bar, locate the task 'Maintain Assignable Roles.'. Step 3: Access the 'Maintain Assignable Roles' screen, then click on the '+' sign to create a new role. Step 4: Enter the Role Name and enable the role for Company, Company Hierarchy, and Cost Center. Click 'OK' to create the role.

  9. Your Role in Workday: Role-Based Security 101

    Security roles are generally assigned to positions, and allow employees to complete the work required by their position. Roles will be used to determine what Workday training employees are expected to complete. All workers will have some self-service access in Workday. What is Role-Based Security?

  10. 4 Ways to Effectively Design and Configure Workday Security

    Four Ways to Effectively Design and Configure Workday Security. 1. Adopt Best Practices | Tailor Workday Delivered Security Groups. Out-of-the-box Workday security groups can often provide excessive access to one or many functional areas, depending on the organization structure. Example: Giving HR associates broad access via the delivered HR ...

  11. HR Unplugged: A Relatable Guide to Workday's Supervisory ...

    Assignable roles in Workday are essential for driving security tasks, granting access to HR team members, and encouraging involvement in HR-related business processes. For example, a payroll ...

  12. Security Roles

    Assignable Roles Resources Overview Security Roles are set-up to allow users to review, act or approve tasks in Workday and allow Employees to functionally support Organizations to which the role is assigned.

  13. User-Based Security Role Assignments

    User-Based Security Role Assignments. Policy Number: WD-201. Effective Date: 7/1/2019. Last Reviewed: 6/21/2019. User-Based roles are those roles that are assigned to specific users in Workday. These roles are not attached to positions and must be assigned to the individual occupying the position. User-based roles are unconstrained and do not ...

  14. Navigating Workday Challenges: A Comprehensive Guide

    Navigating Workday challenges requires a nuanced understanding of role assignments, visibility settings, self-assign roles, and the intricate world of Workday tenants. By addressing these ...

  15. PDF Workday Quick Guide

    WORKDAY QUICK GUIDE How to View Support Roles 3.OVERVIEW To the left-hand side, select Overview . Then, at the top of the page, select the Support Roles tab. 4. SUPPORT ROLES Scroll through the Assignable Roles column until the desired role is found. The Worker column will include the name of the person with the assigned role. 5.CONTACT ...

  16. PDF Workday FIN Security FAQ Quick Reference Guide

    roles in Workday: On the Workday Home page: 1. Type "Role Assignments for Worker Position" and select the report in Workday search. 2. In the Worker field, select the My Team category and pick the employee you want to view their security group(s). 3. Click OK. 4. You will now see a table with the security groups listed in the Assignable ...

  17. Managing Security Role Assignments for an Employee

    Security roles are assigned on the position, not the Employee. Therefore, assigned roles will stay with the position when vacated by an Employee and will be inherited by the next Worker in the position. Refer to the reference guide Assignable Roles for Security in Workday for definitions of security roles used in Workday.

  18. PDF A GUIDE FOR WORKDAY REORGANIZATIONS Ready, set, restructure!

    Role assignments (i.e. manager, owner, hierarchy owner) Organization assignments (allowed and default) Are there updates required for existing supervisory organizations? Some examples include: Assigning a new superior organization (if hierarchy structure is changing and the organization will be reporting to a diferent manager's manager)

  19. Workday HCM System

    This concept of Workday roles and positions is crucial in managing Workday security and ensuring the Workday security of sensitive information. Importance of Role Assignment in Organizations. This topic discusses the importance of assigning roles to specific positions or individuals within an organization. It is the use of single assignment ...

  20. Assign Roles to user using Workday EIB

    Assign Roles web service is used to assign roles to positions or workers. This web service replaces the Assign Organization Roles web service, which is being deprecated. Following are the details: Equivalent Workday Task - Assign roles from the related actions menu of the Worker Profile or the Position Restriction. Tips to populate input files:

  21. PDF Workday

    Workday uses some different terminology from what our current systems use to describe certain actions and roles. The Workday Glossary provides definitions to these terms. Check out the glossary on the UMMC Intranet. Click on the image above to check out the current vs. future state for Supply Chain and Assets!

  22. Inside a NASA-JPL engineer's mission to Jupiter

    Steve Barajas is a mechanical engineer on NASA-JPL's Europa Clipper 2024, the mission looking for an ocean beneath the icy surface of Jupiter's moon Europa.

  23. Role-Based Security Role Assignments

    Requests will be reviewed processed in Workday by the Workday Security Administrator(s). Position Management. Once a role-based assignment is assigned to a position, it will remain with that position until removed. Individuals hired into that position in the future will automatically receive the security.

  24. User-Based Security Role Assignments

    User-Based roles are those roles that are assigned to specific users in Workday. These roles are not attached to positions and must be assigned to the individual occupying the position. User-based roles are unconstrained and do not limit access to any particular subset of workers in Workday. ... User based role assignment may be removed upon ...