Integration Security Flashcards
What is the most common integration tool, used for inbound data loads and simple outbound extracts?
EIB - Enterprise Interface Builder
Which integration tool provides vendor-specific packaged integrations to external systems?
Connector
Does Get permissions to a domain also grant Put access?
False
Modify permission to which domain allows users to create an integration system?
Integration Build
Can Users with View permission to the integration Event domain launch an integration?
False
Running integration reports through the UI requires which type of permission to the Integration Reports domain?
View
A segment-based security group can contain multiple segments?
True
One selection criterion option for integration system security segments is:
Template
What is one benefit of the integration system user model?
Limiting the integration’s access to only the required security policies.
Where should an ISU be assigned?
On the integration system and integration system security group (ISSG).
An integration can be both initiated by and ran as an ISU.
True
Which report or task is used to transfer ownership of an integration schedule?
Scheduled Future Processes Report
What access is required for an ISU to own an integration schedule?
Access to the “Launch / Schedule integration task”
What are the two most common data sources for Workday integration systems?
WWS and Custom Report (RaaS)
Which integration type allows you to determine additional data points using the Configure Field Overrides > Test Security related actions.
Connector
Which type of integration exclusively uses the output of a connector as the data source and does not have unique security requirements?
Document Transformation
Which type of integration is not scheduled?
Inbound EIB (Enterprise Interface Builder)
Which type of integration uses the security of the business user running the integration and does not use an ISU?
Inbound EIB
What should developers provide to security administrators configuring integration security?
A list of web service calls and fields used.
Which task is used to configure password expiration exemption for an ISU?
Maintain Password Rules
What should you do if your auditor will not allow ISUs to keep the same passwords indefinitely?
Use the Put Integration System User web service to update multiple passwords at once
Which permission is needed to launch an integration system using web services?
Get and Put for “Integration Event”
The Signons and Attempted Signons report displays login attempts via web service for a user that does not have the correct permissions.
False
A service center should be created for which scenarios?
An external agency needs to manage benefits integrations via the UI.
Integration Report: Integration Template Catalog
Report used to list the templates available in the tenant. Each template can be used to create an integration system.
Integration Report: View Integration System
Use this report to view the configuration of an integration system, including it’s Workday Account.
Integration Report: Integration Events
Use this report to monitor and review the result of integrations events. Click the link in the integration Event column to view the background process. This page shows the details of the event, including who initiated the event and who the integration ran as.
Integration Report: Scheduled Future Processes
After scheduling an integration, use this report to view the details of scheduled integrations, including the run frequency, start and end date, and who owns the schedule.
Security: Security Analysis for Action?
Use to see which security group provides a specific user access to a specific task.
Security: View Security for Securable Item
Use to determine which domain a specific item is in.
Security: Domain Security Policies for Functional Area
Use to view all the domains in a functional area.
Security: Secured Items in Multiple Domains
Use this report to see which items are secured to more than one domain.
Security: Business Process Security Policies for Functional Area
Displays the business process’ available actions and the security groups permitted for each.