No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Scheduled
Wait Listed
Personal Calendar
Speaking
Conference Event
Meeting
My Interests
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
This web page is not optimized for viewing on a mobile device. Visit this site in a desktop browser to access the full set of features.
Uppercase Letter
Lowercase Letter
Uppercase or Lowercase Letter
Number
Special Character
Password length of
or more and have
of the following:
Password 2 does not match password.
Rising US 2019
Add to My Interests
Remove from My Interests

IT311973 - Demystifying Security: Secure It Your Way with Advanced Security Group Types

Session Speakers
Session Description

Ensuring the right users have access to the right data is a critical function of security administration. Join this session to learn how intersection security can be utilized to refine security group membership and access, ensuring "just right" authorization. Understand challenges of and approaches to transitioning to a new and/or least-access model after go-live. Get a sneak peek into rule-based security, which will simplify security configuration with customer-defined rules.


Additional Information
Workday Deployment Administrator
Medium Enterprise (1000 to 3,499 Employees), Large Enterprise (3,500 Employees or More)
Technology
Security
Retail and Hospitality
Advanced
Understand the use cases, caveats, and configuration of intersection security.
Get a sneak peek at rule-based security and start thinking about your own use cases.
Understand the challenges faced when changing security models after deployment.
Breakout Session
1 hour
Session Schedule
    Similar Sessions
    Session Rating
    This session has not been rated yet /5.0
    Do Not Sell My Personal Information
    First name
    Last name
    Email address