Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 16 Next »



Alin Hunter, Snezana Popovic, UW-IT – The customers of the groups described in this design template represent the owners of Legacy HR/P Archive reports.

Application Use

TBD. BI Portal – The groups will be used for controlling access to the Legacy HR/P Archive reports available in the BI Portal ( and/or EDW (
TBD. Email – The groups will be used for emailing notices about the Legacy HR/P Archive reports using UW Mailman or Marketo.

Membership (Business Definition)

The business definition of the group memberships is individuals assigned to each Workday security group.

For example, someone with the "Academic_Partner" role will be a member of the related UW group.



Business ProcessWorkday security group management
System of RecordWorkday
Subject AreaMaster Data
Business DomainMaster Data – Services & Resources – HR/P – Access permissions and restrictions
Home Groupuw_isc
Group IDs

The following table describes mappings from Workday security group attributes to UW group attributes.

Each UW Group ID will be of the format "uw_isc_security-group_<identifier>" where the <identifier> is replaced with the reference ID of the Workday security group. In order to conform to the UW group syntax, the reference ID will be lowercased and underscores converted to hyphens.

Each UW Group Display Name will be of the format "Workday Security Group - <name>" where the <name> is replaced with the Workday security group name, without any changes to the data.

Workday Security Group Reference IDWorkday Security Group NameUW Group Display NameUW Group ID
Absence_Office_PartnerAbsence Office PartnerWorkday Security Group - Absence_Office_Partneruw_isc_security-group_absence-office-partner
Academic_PartnerAcademic PartnerWorkday Security Group - Academic_Partner


Academic_Personnel_Office_PartnerAcademic Personnel Office PartnerWorkday Security Group - Academic_Personnel_Office_Partneruw_isc_security-group_academic-personnel-office-partner
CBU_Benefits_Office_PartnerCBU - Benefits Office PartnerWorkday Security Group - CBU_Benefits_Office_Partneruw_isc_security-group_cbu-benefits-office-partner

Costing Allocations Coordinator

Workday Security Group - Costing Allocations Coordinatoruw_isc_security-group_costing-allocations-coordinator
HCM_Initiate_2HCM Initiate 2Workday Security Group - HCM_Initiate_2uw_isc_security-group_hcm-initiate-2
HR_AuditorHR AuditorWorkday Security Group - Workday Security Group - HR_Auditoruw_isc_security-group_hr-auditor 
HR_Office_PartnerHR Office PartnerWorkday Security Group - HR_Office_Partneruw_isc_security-group_hr-office-partner
HR_PartnerHR PartnerWorkday Security Group - HR_Partneruw_isc_security-group_hr-partner
ISC_Compensation_Office_PartnerISC - Compensation Office PartnerWorkday Security Group - ISC_Compensation_Office_Partneruw_isc_security-group_isc-compensation-office-partner
ISC_Payroll_Office_PartnerISC - Payroll Office PartnerWorkday Security Group - ISC_Payroll_Office_Partneruw_isc_security-group_isc-payroll-office-partner
ISC_Retiree_Office_PartnerISC - Retiree Office PartnerWorkday Security Group - ISC_Retiree_Office_Partneruw_isc_security-group_isc-retiree-office-partner
Labor_Relations_Union_Office_PartnerLabor Relations / Union Office PartnerWorkday Security Group - Labor_Relations_Union_Office_Partneruw_isc_security-group_labor-relations-union-office-partner
Payroll_AuditorPayroll AuditorWorkday Security Group - Payroll_Auditoruw_isc_security-group_payroll-auditor
VO_Medical_Centers_Payroll_PartnerVO-Medical Centers Payroll Partner (RBC)Workday Security Group - VO_Medical_Centers_Payroll_Partneruw_isc_security-group_vo-medical-centers-payroll-partner
VO_Medical_Centers_Absence_for_Leave_SpecialistVO-Medical Centers Absence for Leave SpecialistWorkday Security Group - VO_Medical_Centers_Absence_for_Leave_Specialistuw_isc_security-group_vo-medical-centers-absence-for-leave-specialist
VO_STAFF_COMP_COSTVO-STAFF-COMP-COSTWorkday Security Group - VO_STAFF_COMP_COSTuw_isc_security-group_vo-staff-comp-cost
Display Name

Group display names will be populated with data from Workday. See table above.

Lifecycle Policy (Creation)

Groups will be created only for approved uses related to Legacy HR/P Archive reports.

Lifecycle Policy (Deletion)

Groups will be deleted when data custodians request and plan for their deletion.

Membership (Direct)

Direct membership of each group include the UW NetIDs of individuals assigned to the specific Workday security group.

Membership (Exceptions)

No exceptions for additions or deletions to memberships. All updates to the memberships must be made in Workday.

Membership (Grace Period)


Membership (Opt-in)N/A
Membership (Opt-out)N/A
Contact Person

TBD. A contact appropriate for Workday security group support, e.g. "ischelp".


Group descriptions will contain the following information (substituting the specific display name for each group):

"Workday Security Group - Academic_Partner. This group is updated nightly with data sourced from Workday. It is available only for approved business purposes. Authorized users are responsible for enforcing the defined access control policy and may not share the group membership with unauthorized parties without first obtaining authorization to do so. Please contact for questions about using this group."

More InformationN/A 
Application Settings (Exchange)

Inactive; change to settings will require custodian approval.

Application Settings (Google)

Inactive; change to settings will require custodian approval.

Data Custodian

Nancy Jagger, Rachel Gatlin, Margaret Stuart, Cindy Gregovich


Confidential. See UW Groups Data Classification Guideline.

Access Control Policy

The data custodians have classified these UW group memberships as Confidential. This classification forms the basis of the following access control policy and appropriate use guidelines. It is also the basis of the Membership Viewer Control (below) and Description (above).

Access Control Policy: Having considered privacy, security, and compliance concerns and acknowledging the business needs for Workday security group memberships, the data custodians have established an access control policy that grants permission to view Workday security group memberships only to authorized users and processes based on business need.

Appropriate Use Guidelines: Use of Workday security group memberships is subject to the following appropriate use guidelines. Permission to view Workday security group memberships is granted on the condition that authorized clients use the memberships only for approved business purposes in support of access to Legacy HR data. Authorized users are responsible for enforcing the defined access control policy (above) and may not share group memberships with unauthorized parties without first obtaining authorization to do so. Copying and sharing the membership data with unauthorized users violates the access control policy and is forbidden.

Membership Viewer Control

TBD. uw_isc_security-group-viewer. This group is used to enforce the defined access control policy (above). 

Sender ControlN/A
Data Source


Membership (Technical)

TBD. Ann Testroet

Define the technical definition of the memberships in terms used by the data source (HRPWS) and its data elements, as well as any additional filtering.


TBD. Ann Testroet Similar to uwhrlocationgroupmaker

Define a provisioning model for data integration and reconciliation that ensures the groups are created in accordance with their lifecycle policy and managed in accordance with their data quality standards.


TBD. Ann Testroet Similar to uwhrlocationgroupmaker

Define a de-provisioning model that ensures the groups are deleted in accordance with their lifecycle policy.


TBD. Ann Testroet Similar to uwhrlocationgroupmaker

Define a monitoring solution that helps identify incidents and problems, particularly those that impact availability and reliability.

Data Quality Standards

TBD. Ann Testroet Similar to uwhrlocationgroupmaker

Define data quality standards under normal operations, including data validation rules, timeliness of updates, defined error rates, integrity monitoring, and reliability. The standards will depend on the business process, system of record, data source, provisioning and de-provisioning models, monitoring, and operations.

Internal Documentation

TBD. Ann Testroet Similar to uwhrlocationgroupmaker

Define what internal documentation will be developed and where it will be maintained.

Customer DocumentationTBD. 
Communication PlanAlin and Snezana will coordinate communications part of the "Legacy HRP System Shutdown and Data Archiving - Implementation" project (PRJ0234400).
Request FulfillmentTBD. All requests that cannot be handled self-service by the Customer Documentation, will be directed to the email address defined by the Contact Person (above). Examples of requests include standard requests for information and access to memberships.
Change ManagementTBD. The data custodians and/or ISC and/or Arlene will be responsible for changes to Workday security group reference IDs. Changing an existing reference ID impacts customers of the corresponding UW group, and appropriate change management can reduce the impact to business operations.
Incident ManagementIncidents with the group memberships, with a root cause attributed to UW-IT's systems and processes, will be handled via the UW-IT Incident Management practice.
  • No labels