Integration Security Flashcards
What is the most common integration tool used for inbound data loads and simple outbound extracts?
A. Document Transformation
B. EIB
C. Connector
D. Workday Studio
B. EIB
Which integration tool provides vendor-specific packaged integrations to external systems?
A. EIB
B. Workday Studio
C. Document Transformation
D. Connector
D. Connector
Modify permission to which domain allows users to create an integration system?
A. Integration Configure
B. Integration Build
C. Integration Event
D. Integration Security
B. Integration Build
True or False? Users with View permission to the Integration Event domain can launch an integration.
False
Running integration reports through the UI requires which type of permission to the Integration Reports domain?
A. View
B. Modify
C. Get
D. Put
A. View
True or False? A segment-based security group can contain multiple segments.
True
One selection criterion option for integration system security segments is:
A. EIB
B. Template
C. Packaged integrations
D. Financial integrations
B. Template
For the integration event domain, if a user has modify permission via both a segment-based and a user-based security group, which integrations can they launch?
A. The user will have access to all integrations.
B. The user will have access to the integrations included in the segment.
C. The user will not have access to any integrations.
D. The user will not have access to that task.
A. The user will have access to all integrations.
What are the two most common data sources for Workday integration systems?
A. Custom Report (RaaS) and Data Initialization Service (DIS)
B. Data Initialization Service (DIS) and WWS
C. Custom Report (RaaS) and WWS
D. Business processes and external files
C. Custom Report (RaaS) and WWS
Which type of permission will grant access to a web service operation within an integration system?
A. Initiating Action on a business process security policy
B. Get permissions on a domain security policy
C. Put permissions on a domain security policy
D. A, B, and C depending on the web service operation
D. A, B, and C depending on the web service operation
Which integration type allows you to determine additional data points using the Configure Field Overrides > Test Security related action.
A. Inbound EIB
B. Outbound EIB
C. Document Transformation
D. Connector
D. Connector
Which type of integration exclusively uses the output of a connector as the data source and does not have unique security requirements?
A. Inbound EIB
B. Outbound EIB
C. Document Transformation
D. Workday Studio
C. Document Transformation
Which type of integration is rarely scheduled?
A. Connector
B. Inbound EIB
C. Outbound EIB
D. Workday Studio
B. Inbound EIB
Which type of integration uses the security of the business user running the integration and does not use an ISU?
A. Inbound EIB
B. Outbound EIB
C. Document Transformation
D. Workday Studio
A. Inbound EIB
What should developers provide to security administrators configuring integration security?
- What is the data source? Grant domain access.
- Are there other data points? Grant domain access.
- Does it use a business process? Grant business process access.
- Is there a schedule? Grant Modify access to the Integration Event.