Security Roles define a subset of people with specific responsibilities and permissions. They:
- Determine who can initiate, approve, and act on all business processes
- Determine what information you can view via reports, profiles, and other informational screens
- Can be assigned to any position, and positions can have multiple security roles to suit their needs
- Sometimes require additional training, dependent on their level of access
- Are specific to a set of supervisory organizations
How Do I Request A Security Role?
To make changes to Security Roles, send an email to HRWMS@uw.edu and include details about the change. A member of the WMS team will create a UW Connect ticket in order to track the request and will follow up with you for additional details, if necessary.
When your organization needs to change Security Roles, your Supervisory Organization’s HR/Academic Partner should submit the form at the link below.
SUBMIT A SECURITY ROLE CHANGE
- Security Roles are assigned at a Supervisory Organization level.
- A separate form must be submitted for each individual who requires a change to their Security Roles.
- Any required internal department/unit approvals should be completed prior to submitting the form.
- All required training must be completed prior to submitting the form.
- If the role assignment is a result of a job and/or position change (i.e. promotion, transfer), confirm the Job Change is completed in Workday prior to submitting the form.
Common Security Roles
The following pages provide you with information on:
- Overview of the role
- Training for that role
- Commonly used resources by the role
How Do I Know Which Roles I Need?
Before you decide which security roles you need, you need to know:
The security roles you/the worker you are investigating currently have:
- To see your own, run the My Supporting Roles report by typing “My Supporting Roles” into Workday’s search field. (Note that your search will be successful only if you have an elevated role; if you do not have an elevated role, the My Supporting Roles report will not appear in the search results.)
- To view a worker’s role assignment, from the Worker’s profile, select Related Actions > Security Profile > View Role Assignments for Worker Position.
- To see who is supporting you and in what capacity, click on your Supervisory Organization or Academic Unit, then click the Roles tab.
What business processes will I be working with (Ex. Hiring, Entering Time, Reviewing I-9s, etc.)?
- To check out which bps can be executed by which roles, check out our User Guide Library.
- Check out the home page for each commonly used security role to see what training you’ll need.
Who approves my work?
- Often times, knowing who your work will run through for approval will help you situate yourself on the “hierarchy” of roles. Also check out the home pages above for more on this.
Someone With A Security Role Is Leaving…
Temporarily Delegating Your Security Role
If someone is going on leave you can always delegate their security role to someone else.
If someone is leaving permanently you may have to submit a security role change form by following the steps listed on this page to request the security role.