Read time:ย 8 minutes
Hey there! Managing user-based security group assignments has been a major pain point for Workday customers for years on endโฆ
Until now! Those days are finally behind usโif you implement the new functionality ๐
In todayโs newsletter, Iโm sharing a step-by-step guide to help you successfully upgrade your security setup.
With 2024R1 and 2024R2, Workday released two new business processes that replace the old, non-workflow-enabled tasks for assigning user-based security groups. With these business processes, we say goodbye toโฆ
๐ Lack of approvals and process visibility
๐ Compliance risks / SOC concerns galore
๐ Lousy delivered and custom reporting
The User-Based Security Group Event for User business process replaces the โAssign User-Based Security Groups for Personโ task for assigning / removing multiple user-based security groups for a user (2024R1).
And the User-Based Security Group Event for Group business process replaces the โAssign Users to User-Based Security Groupโ task for assigning / removing multiple users from a single user-based security group (2024R2).

Out with the old and in with the new! Seriously, donโt sleep on implementing these game-changing upgrades.
Without further ado, grab your coffee or tea, and letโs get this party started! ๐๐ป
Step 1: Plan your projectโthe well built way!
The best way to ensure your Workday initiatives are successful, no matter how mini or massive the undertaking, is to structure your work as projects. Whether youโre rolling out a new module or simply deploying a new business process, a โจ project structure โจ inspires accountability, organization, and execution.
So before we dive into configuring your security upgrade, letโs set you up for success! The more thought you put into this step, the better your deployment will be.
You can think of this implementation as a mini project. Here are your phases and steps:
Plan:
Step 1: Project planning: Team, timeline, requirement gathering
Configure:
Step 2: Enable the new domain, โProcess: User-Based Security Group Eventโ
Step 3: Create your new business processes
Step 4: Configure your business process security policies
Step 5: Configure your business process definitions
Step 6: Set up custom business process notifications (if you want!)
Step 7: Disable the old functionality
Test:
Step 8: Test!
Document and empower:
Step 9: Document your new setup and educate your team
Deploy:
Step 10: Go live in PROD ๐
For this mini project, you can split planning into 3 stepsโฆ
Build your team - who is responsible for each step of this project?
Establish a project timeline - how long do you expect each project phase to take? Hereโs a high-level 6-week sample timeline. You can tighten or extend this to match your teamโs pace and bandwidthโฆ
Plan (2 weeks)
Configure (1 week)
Test (1 week)
Document and empower (1 week)
Deploy (1 week)
Requirement gathering: What information do you need to implement this upgrade? Focus onโฆ
BP definition workflows - what steps, actions, and/or approvals should kick off in Workday when a user-based security group assignment or removal is initiated for a) one user for one or more groups and b) one group for one or more user? Map these workflows in detail.
BP security policies - who / which security groups will have which business process access? Consider all permissions on each BP security policy. Here are a few heavy hittersโฆ
Initiate, Review, View All (Needed to view the event data for reporting), Approve, Cancel, Deny
Custom notifications - do you need to notify workers, security groups, and/or third parties with specific information when a user-based security group assignment or removal is completed?
Change management - who needs to be trained on this upgrade? How will you inform, educate, and empower them?
Alright! ๐ช That was no easy featโbut getting the details right from the get-go is a winning strategy (and we want you to win!). With this preparation complete, youโre ready to cruise through the rest of this mini project ๐ So letโs get to itโฆ
Step 2: Enable the new domain, โProcess: User-Based Security Group Eventโ
Navigate to the domain, โProcess: User-Based Security Group Eventโ. Your quickest way there is to use the prefix โdomain:โ in the search bar.

Click the related action button next to โDomain Security Policyโ, hover over โDomain Security Policy,โ and click โEnableโ. Check the โConfirmโ box and press OK.

This domain automatically inherits its parent domainโs permissions (Security Administration). I recommend leaving these settings in place, but hereโs how to edit the permissions more granularly:
Click on the related action button on the domain, hover over โDomain Security Policyโ, and click โEdit Permissionsโ. Update the View, Modify, Get, and Put permissions as desired, then click OK.

Activation time! ๐ฅ A critical step to never forget. Navigate to the task, โActivate Pending Security Policy Changesโ, leave a detailed comment, and press OK.


Your domain will now have a Status of โActiveโ ๐
Step 3: Create your new business processes
There are two new business processes youโll need to create:
User-Based Security Group Event for User
User-Based Security Group Event for Group
In this guide, weโll walk through setting up the User-Based Security Group Event for User BP. You can then follow the same steps to set up the User-Based Security Group Event for Group BP on your own.
Use the task, โCreate Business Process Definition (Default Definition)โ, to create your new business process definition.

On your next screen titled โEdit Business Processโ, simply press OK. Before you can configure steps on the business process, youโll need to set up the Business Process Security Policyโฆ
Step 4: Configure your business process security policies
Click on the related actions button on the business process, hover over โBusiness Process Policyโ, and click โEditโ.

Configure the permissions on the business process security policy at your organizationโs discretion (as you planned in Step 1!). To keep things simple, I recommend leveraging the Security Administrator and/or HR Administrator security groups.

Activation time, once more! Navigate to the task, โActivate Pending Security Policy Changesโ, leave a solid comment, and press OK.

Step 5: Configure your business process definitions
Now for the fun partโwhere the magic of this upgrade happens! ๐ช Letโs set up the business process steps.
Navigate back to the business process, click on the related actions button, hover over โBusiness Processโ, and click โEdit Definitionโ.

Add your business process steps per your organizationโs defined policy. Click the โ+โ button to add rows. The permissions you set up in Step 4 on the BP security policy determine which steps you can assign to which security groups.

Donโt forget to set your completion step, typically the last approval in your definition.

Other setup steps to consider here areโฆ
Advanced Routing - for example, exclude initiators from approving their own assignments.
Business Process Validations - are there situations in which initiation should be blocked, or slowed with a warning?
Business Process Conditions - should certain steps be skipped if specified conditions are or are not met?
Step 6: Set up custom business process notifications (if you want!)
This step is totally optional! To add custom notifications, click on the related actions button on the business process, hover over โBusiness Processโ, and click โAdd Notificationโ.

Step 7: Disable the old functionality
Now that youโve got the new functionality in place, thereโs no reason to keep the legacy tasks in play (unless you want to make a big oleโ mess out of your audit trails ๐ตโ๐ซ).
Hereโs how to disable the old tasks once and for allโฆ
Navigate to the task, โMaintain Feature Opt-Insโ, find the โDisable User-Based Security Group Assignment Taskโ item (filter the column to be speedy!), and click the โOpt In to Featureโ button:

By disabling the existing tasks, all user-based security group assignment changes will go through the new business process. To confirm youโve successfully disabled the tasks, check the related actions on a user-based security group. Only one initiation option should remain, โUpdate Membershipโ:

Before

After
Workday hasnโt specified a deprecation date yet, however, the non-workflow-enabled tasks will be deprecated down the road. Since you are proactively implementing the new functionality, you wonโt be scrambling when that day comes ๐
Step 8: Test!
Use the Update User-Based Security Group Assignments initiating task to test the โUser-Based Security Group Event for Userโ BP.

And use the Update User-Based Security Group Membership initiating task to test the โUser-Based Security Group Event for Groupโ BP.

Test plentiful scenarios! Ensure every piece of configuration you set up is put to the test, including routing rules, BP validations, BP conditions, custom notifications, etc.
Step 9: Document your new setup, and educate your team
This is a crucial step that is so often forgotten or skipped. Before you go live in PROD, document your configuration and train your team on your new processes and policies. Ahead of going live, your team should feel empowered to utilize and own your upgraded setup.
At this stage, for our clients, we typically deliverโฆ
โ User guides with clear screenshots (kind of like what youโre reading right now ๐).
โ Custom demo videos using our favorite recording software, Tella.
โ Live training sessions with key stakeholders and end users (we record these so they can be rewatched!).
Step 10: Go live in PROD ๐
Itโs that time! ๐ฅณ Complete the following setup steps manually in Production:
Step 2: Enable the new domain, โProcess: User-Based Security Group Eventโ
Step 3: Create your new business processes
Step 4: Configure your business process security policies
Step 7: Disable the old functionality
For maximum efficiency, migrate your business process definitions (the following steps) using Object Transporter:
Step 5: Configure your business process definition
Step 6: Set up custom business process notifications (if you want!)
To migrate your BP (including any custom notifications), click the related action button on the BP, hover over โInstanceโ, and click โMigrate with Object Transporter (FYI - Workday dropped the 2.0 from OXโs name with 2024R2).

As you deploy your setup in PROD, ensure you complete your configuration steps in order.
And there you have itโyour security upgrade mini project is COMPLETE!
๐๐๐
As always, thank you for reading!
Weโre celebrating you and your pursuit of a Well Built Workday ๐ฅณ
Until next time!
Ceci & Mia
Co-Founders of Well Built Solutions

Say hi ๐ on LinkedIn โ @ceciblomberg, @miaeisenhandler
P.S. When youโre ready, hereโs how we can helpโฆ
Learn Workday calculated fields: Master calculated fields in Workday once and for all with our free 34-part โ ๏ธ Calculated Fields Demystified ๐ค๏ธ LinkedIn series.
Accomplish your phaseX projects: Crush your organizationโs Workday roadmap, get your projects done well, and have fun while you do it!
Get Workday guides and training: Custom documentation and training videos that upskill your team and workforce. Book a call with us to learn more.
