8. Security Structure Flashcards
Security in Adaptive Planning is primarily based on two components:
1. The permission set assigned to a user (so they can sign in), and
2. The access rules assigned to the user (so they can view and edit data.)
True or false?
True
The permission set determines the ___ that the user can perform within the model, and the access rules determine what ___ the user can view or edit.
Tasks, data
Every Adaptive Planning user must be:
- Assigned to a permission set.
- Assigned owned levels.
- Assigned access rules to view or edit data.
- Given read access.
- Assigned to a permission set.
- Assigned owned levels.
- Assigned access rules to view or edit data.
Adaptive Planning has predefined permission set templates that you can use (or delete) when creating new permission sets which include…
- Finance Planner
- View Only
- Contributor
- Implementer
- Power User
- Approver
- View Only
- Contributor
- Implementer
- Power User
User management is a…
- Manual Process
- Manual or bulk import process
- Bulk import process
- Manual process
When adding new users to Adaptive Planning, which fields are mandatory to populate?
- Name
- Username
- Country
- Timezone
- Password
- Owned Levels
- Name
- Username
- Password
A user must be assigned to a permission set and levels to sign in. True or false?
True
Access rules define specific intersections of data that ___ or ___ can edit or view.
With access rules, you control access to each intersection of data.
Users, groups
Access rules apply to…
- Sheets
- Dashboard charts
- Reports
- Administration
- Modelling
- OfficeConnect
- Shared Formulas
- Consolidation
- Sheets
- Dashboard charts
- Reports
- OfficeConnect
A user must have a permission set enabled with the “Users” permission to create and revise access rules. True or false?
True
Associations connect ___ and custom ___ to users.
You can then use association codes to create access rules for users and groups.
Levels, dimensions
When you use associations for access rules, you can update the associations, instead of the rules, to update user access. True or false?
True
What are the 5 steps to security structure in Workday Adaptive Planning?
- Permission Sets
- Users
- Global User Groups
- Password Management
- Associations
- Access Rules
- Permission Sets
- Users
- Global User Groups
- Associations
- Access Rules
What are the benefits to using Access Rules?
- Protect sensitive details.
- Provide flexibility on what you can view or edit.
- Create conditional access in specific areas of the model.
- Free up levels
- Simplified data entry
- Simplified dashboarding
- Simplified reporting
- Protect sensitive details.
- Provide flexibility on what you can view or edit.
- Create conditional access in specific areas of the model.
- Free up levels
- Simplified data entry
- Simplified reporting