Horizon/skyline from UW Seattle Campus

Security Role Services

Security roles define a person's specific responsibilities and permissions in Workday. They: 

  • Determine who can initiate, approve, and act on business processes 
  • Determine what information an individual can view via reports, profiles, and other informational screens 
  • Can be assigned to any position, and positions can hold multiple security roles depending on their job function 
  • Sometimes require additional training, depending on their level of access 

AST assists in the management of security roles in Workday, which includes the authority to grant, delegate, or remove Workday Finance and Human Capital Management (HCM) roles on behalf of units.

On this page...

Resources

Back to Top

Training resources for Workday Finance security roles can be found in the UW Connect Finance Portal (UW NetID login required). HCM security role trainings are managed by Employee Workday Help (EWH) and can be found in the Workday Learning Library

Requesting a security role? Ensure ensured the Assignee(s) has completed the required training for all security roles requested.

Common Workday Finance Security Roles

Back to Top
Role  What they do What they can see
Cost Center Financial Analyst  Perform financial reporting functions for assigned cost centers; view-only, no approval authority. Accounting adjustments, accounting journals, ad hoc payments, purchase orders, requisitions, supplier invoices and supplier invoice requests for assigned cost center(s).
Cost Center Manager Approve purchases and manage cost center funds. Transactions pending funding approval from the cost center manager for assigned cost center(s).
Expense Data Entry Specialist Perform expense report data entry functions for assigned organizations such as creating expense reports for other workers. Expense reports, CTAs in progress and to be approved.
Finance Analyst View all financial setup and operational data for organization and subordinates. Accounting adjustments, accounting journals, ad hoc payments, goods delivery, purchase orders and requisitions, expense reports, customer and supplier invoices and invoice requests, etc.
Internal Service Delivery Data Entry Specialist Create, change, and edit internal service delivery documents. Transactions associated with their unit’s individual ISP(s).
Grant Manager Primary manager for assigned grants, serves as approver for associated financial business processes, and completes award tasks. Transactions pending funding approval from the grant manager.
Grant Financial Analyst Perform financial reporting functions for assigned grants; view-only, no approval authority. Accounting adjustments, accounting journals, ad hoc payments, purchase orders, requisitions, supplier invoices and supplier invoice requests for assigned grant(s).
Procurement Data Entry Specialist Perform procurement data entry functions for assigned organizations. ProCard transactions and verifications for workers; authority to verify transactions.
Requisition Requester Create and maintain requisitions and receipts, as well as create non-purchase order supplier invoices. View access to purchase orders, PO acknowledgements and advance ship notifications.
Requisition Requester < $3500 Create and maintain requisitions and receipts, as well as create non-purchase order supplier invoices. Requisitions up to $3500 do not need cost center manager approval. View access to purchase orders, PO acknowledgements and advance ship notifications.
Unit Asset Coordinator Responsible for asset maintenance at the unit level, including issuing, transferring, and reporting on assets View asset adjustment, disposal, registration, removal, and useful life update.

 

Common Workday HCM Security Roles

Back to Top
Role What they do
HR Partner*  Review and approve hiring and staffing processes for all non-academic personnel in assigned supervisory organization(s).
Academic Partner* Review and approve hiring and staffing processes for academic personnel in assigned supervisory organization(s).
Time & Absence Approver* Approve employee’s or team of employee’s timesheets and time off requests.

*These listed roles all view the same information, including employee personal details, compensation details and worker history.

To learn more about HCM security roles, visit the EWH's resources on HCM security roles.  

Workflows

Back to Top

Security Role Processing Time and Workflow

The turnaround time for adding or modifying a security role is 1-7 business days.

The workflow image below links to a PDF where you can scale to your liking. This workflow is also available in a Word document.

Security Role Workflow (PDF)

Frequently Asked Questions

Back to Top

For Further Support

Back to Top

Reach out and we will route your questions, comments, and/or ideas to the appropriate subject matter experts on our team and keep an eye out for monthly updates via AST's Newsletter.

Last Updated: Thursday, December 26, 2024