8. Security Structure Flashcards

1
Q

Security in Adaptive Planning is primarily based on two components:
1. The permission set assigned to a user (so they can sign in), and
2. The access rules assigned to the user (so they can view and edit data.)

True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The permission set determines the ___ that the user can perform within the model, and the access rules determine what ___ the user can view or edit.

A

Tasks, data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Every Adaptive Planning user must be:

  1. Assigned to a permission set.
  2. Assigned owned levels.
  3. Assigned access rules to view or edit data.
  4. Given read access.
A
  1. Assigned to a permission set.
  2. Assigned owned levels.
  3. Assigned access rules to view or edit data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adaptive Planning has predefined permission set templates that you can use (or delete) when creating new permission sets which include…

  1. Finance Planner
  2. View Only
  3. Contributor
  4. Implementer
  5. Power User
  6. Approver
A
  1. View Only
  2. Contributor
  3. Implementer
  4. Power User
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

User management is a…

  1. Manual Process
  2. Manual or bulk import process
  3. Bulk import process
A
  1. Manual process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When adding new users to Adaptive Planning, which fields are mandatory to populate?

  1. Name
  2. Username
  3. Email
  4. Country
  5. Timezone
  6. Password
  7. Owned Levels
A
  1. Name
  2. Username
  3. Password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user must be assigned to a permission set and levels to sign in. True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access rules define specific intersections of data that ___ or ___ can edit or view.
With access rules, you control access to each intersection of data.

A

Users, groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access rules apply to…

  1. Sheets
  2. Dashboard charts
  3. Reports
  4. Administration
  5. Modelling
  6. OfficeConnect
  7. Shared Formulas
  8. Consolidation
A
  1. Sheets
  2. Dashboard charts
  3. Reports
  4. OfficeConnect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user must have a permission set enabled with the “Users” permission to create and revise access rules. True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Associations connect ___ and custom ___ to users.
You can then use association codes to create access rules for users and groups.

A

Levels, dimensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When you use associations for access rules, you can update the associations, instead of the rules, to update user access. True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 5 steps to security structure in Workday Adaptive Planning?

  1. Permission Sets
  2. Users
  3. Global User Groups
  4. Password Management
  5. Associations
  6. Access Rules
A
  1. Permission Sets
  2. Users
  3. Global User Groups
  4. Associations
  5. Access Rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the benefits to using Access Rules?

  1. Protect sensitive details.
  2. Provide flexibility on what you can view or edit.
  3. Create conditional access in specific areas of the model.
  4. Free up levels
  5. Simplified data entry
  6. Simplified dashboarding
  7. Simplified reporting
A
  1. Protect sensitive details.
  2. Provide flexibility on what you can view or edit.
  3. Create conditional access in specific areas of the model.
  4. Free up levels
  5. Simplified data entry
  6. Simplified reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly