Saturday, February 11, 2023

HTML2

 1.

<HTML>

<HEAD>

<TITLE>RAJ BLOG</TITLE>

</HEAD>

<BODY>

<H1>Raj documents</H1>

<H2>Raj documents</H2>

<H3>Raj documents</H3>

<H4>Raj documents</H4>

<H5>Raj documents</H5>

<H6>Raj documents</H6>

</BODY>

</HTML>


output:

2.
<HTML>
<HEAD>
<TITLE>RAJ BLOG</TITLE>
</HEAD>
<BODY>
<H1>Raj documents</H1>
<H2>While Kohli scored his 46th ODI century on Sunday, the Indian batsman is three short of Sachin Tendulkar's record of 
49 ODI centuries and currently has 74 International centuries in his career. 
<p>Gavaskar believes that Kohli can score another 26 centuries in the coming 
5-6 years and can reach the mark of 100 hundreds.</p>His total of 51 centuries in Test matches and 49 in ODIs are world 
records for highest number of centuries by a batsman. 
He became the first and only cricketer to score 100 international centuries when he made 114 against Bangladesh in March 2012.</H2>

</BODY>
</HTML>

output:


3. Line Break, Horizontal line

<HTML>
<HEAD>
<TITLE>RAJ BLOG</TITLE>
</HEAD>
<BODY>
<H1>Raj documents</H1>
<hr>
<hr>
<HR>
<H2>While Kohli scored his 46th ODI century on Sunday, the Indian batsman is three short of Sachin Tendulkar's record of 
49 ODI centuries and currently has 74 International centuries in his career.<br>Gavaskar believes that Kohli can score another 26 centuries in the coming 
5-6 years and can reach the mark of 100 hundreds.

</BODY>
</HTML>

Output:

4.Bg color.Alignment
<HTML>
<HEAD>
<TITLE>RAJ BLOG</TITLE>
</HEAD>
<BODY bgcolor="yellow">
<H1 align= "center">Raj documents</H1>
<hr>
<hr>
<HR>
<H2 align="right">While Kohli scored his 46th ODI century on Sunday, the Indian batsman is three short of Sachin Tendulkar's record of 
49 ODI centuries and currently has 74 International centuries in his career.<br>Gavaskar believes that Kohli can score another 26 centuries in the coming 
5-6 years and can reach the mark of 100 hundreds.

</BODY>
</HTML>
output:


5. Font, color,
<HTML>
<HEAD>
<TITLE>RAJ BLOG</TITLE>
</HEAD>
<BODY bgcolor="yellow">
<H1><font size="5" color="red" face="mistral">Raj documents</font></H1>
<hr>
<hr>
<HR>
<H2 align="right">While Kohli scored his 46th ODI century on Sunday, the Indian batsman is three short of Sachin Tendulkar's record of 
49 ODI centuries and currently has 74 International centuries in his career.<br>Gavaskar believes that Kohli can score another 26 centuries in the coming 
5-6 years and can reach the mark of 100 hundreds.

</BODY>
</HTML>

output:


c

7.


<HTML>
<TITLE>RAJ BLOG</TITLE>
<BODY>
<H1>>Raj documents</H1>
<b>Raj Documents</b><br>
<i>Raj Documents2</i><br>
<u>Raj Documents3</u><br>
<strike>Raj Documents3</strike><br>
a<sup>2</sup>-b<sup>2</sup><br>
h<sub>2</sub>o<br>
<strong>Raj Documents5</strong><br>
<hr>
<hr> <hr><hr>
</BODY>
</HTML>
output:


8. Big,Small,center,right,left, <wbr>(deleting space)
<HTML>
<TITLE>RAJ BLOG</TITLE>
<BODY>
<H1><center><Big>Raj documents</Big></center></H1>
<b><small>Raj<wbr>Documents</small></b><br>
<i>Raj Documents2</i><br>
<u>Raj Documents3</u><br>
<strike>Raj Documents3</strike><br>
a<sup>2</sup>-b<sup>2</sup><br>
h<sub>2</sub>o<br>
<strong>Raj Documents5</strong><br>
<hr>
<hr> <hr><hr>
</BODY>
</HTML>

Output:


8.Marquee tag "Container tag
<html>
<title>RAz Blog</title>
<hr>
<hr>
<body>
<H1>Raj documents</H1>
Environmental studies is a multidisciplinary academic field which systematically studies human interaction with the environment.
 Environmental studies connects principles from the physical sciences, commerce/economics,
 the humanities, and social sciences to address complex contemporary environmental issues.
<hr>
<hr>
<br>
<Marquee bgcolor = "yellow"> <font face = "impact" size="4" color = "red">SAP, ABAP,MM,SD,FICO,HR</font></Marquee>
<hr>
<hr>
</body>
</html>


Marquee direction = “right”

Marquee direction = “up”

Marquee width = “50%”

Marquee scrollamount = “60”

Output:



9.Bullets(unorder list)[UL] & Numbering(order list)[OL]

These are container tags

<html>

<title>RAz Blog</title>

<hr>

<hr>

<body>

<LI>SAP-MM</LI>

<LI>SAP-SD</LI>

<LI>SAP-FICO</LI>

<LI>SAP-HR</LI>

<hr>

</body>

</html>

Output:


10.

<html>

<title>RAz Blog</title>

<hr>

<hr>

<body>

<FONT FACE="IMPACT" SIZE="6" COLOR="GREEN">

<UL TYPE = "CIRCLE">

<LI>SAP-MM</LI>

<LI>SAP-SD</LI>

<FONT FACE="MISTRAL" SIZE="6" COLOR="PINK"><LI>SAP-FICO</LI></FONT>

<LI>SAP-HR</LI>

</UL>

<hr>

</body>

</html>

<UL TYPE = "CIRCLE">

*SQURE, DISC

Output:




<html>

<title>RAz Blog</title>

<hr>

<hr>

<body>

<FONT FACE="IMPACT" SIZE="6" COLOR="GREEN">

<OL TYPE = "i">

<LI>SAP-MM</LI>

<LI>SAP-SD</LI>

<FONT FACE="MISTRAL" SIZE="6" COLOR="PINK"><LI>SAP-FICO</LI></FONT>

<LI>SAP-HR</LI>

</UL>

<hr>

</body>

</html>


output:




11.

<html>

<title>RAz Blog</title>

<hr>

<hr>

<body>

<FONT FACE="IMPACT" SIZE="6" COLOR="GREEN">

<OL start= "7">

<LI>SAP-MM</LI>

<LI>SAP-SD</LI>

<FONT FACE="MISTRAL" SIZE="6" COLOR="PINK"><LI>SAP-FICO</LI></FONT>

<LI>SAP-HR</LI>

</UL>

<hr>

</body>

</html>


output:



Image:


















HTML1

Programming language

Using this software’s is generated.

e.g.c,c++,JAVA,.NET,SAP,ORACLE

 

Scripting Language:

Using these web pages generated

HTML, CSS, JAVA SCRIPT, .VB SCRIPT

 

Website is a collection of webpages

 

Web pages are mainly 3 types.

Static web page:

Changes and updates are very time consuming

Content can get stagnant

e.g.IRCTC, Indian railways, Net banking

Dynamic web page:

e.g. All news webs

Much easier to update,content/pages

more expensive and slower to develop

ites, All shopping sites, Songs download sites

 

Server page:

All the data stoe in server page

 

TAGS:

<html>--------->  Tag

html----------->  Predefined words & not case sesitive

 2 Types of stags

Container tags/ Pair Tags:

Consist of opening tag <html>

Closing tag</html>

Empty tags/ Single Tags:

consist of opening tag  <raj>

 

HTML programming structure

Tags, Elements, Attributes

 

Tags:

<html>

<head>

<title>

<body>

 

the program should start with <html> and end with </html>

<> 

 


Wednesday, May 25, 2022

Reference IDs:

 

Reference IDs:

Reference IDs is something which you would realize that it is one of the important thing in Workday. This tells you how exactly the codes are stored and maintained at the back-end (OMS).

The Reference IDs will be used at the time of filling your templates in the excel sheets for EIB Inbounds or i Loads

Let us take an example of Gender Business Object, where you typically see Male, Female and Not disclosed. How Workday does stores the values of these? the answer to this is - In the form of Reference ID Value.

There are three tasks related to Reference IDs

        I.            View Reference IDs - Just view 

      II.            Maintain Reference IDs - Can set preferences and edit too

    III.            Edit Reference ID - To edit a specific instance

Access the task View Reference IDs from search bar and key in the BO that you want to see. This is just view only of your Reference Ids.

 

Below screen shows the three instances of Reference IDs. Also notice the Reference ID Value pertaining to each of the instance. The Reference ID value of  "Not Declared" is empty

Access the task Maintain Reference IDs, below screen shows up. Here you have options based on what to display on the further screen. 

Include Empty Values Only-Returns all the empty reference id Values.  Example: Not Declared.

Include Defaulted Values Only - Returns all the defaulted values of the instances.

None of the above - Returns all the instances of the Business Object.

Up on Clicking OK on above screen, you can see the screen where you will be able to edit / maintain your existing Reference ID Values. Notice that we have added "Not_Declared"

Access the task Edit Reference ID where you can edit one Instance of your Business Object at a time. See below Example where we try to edit Reference ID - Not Declared.

Below is the screen which shows the Value that you can edit for your Reference ID

 

PECI vs PICOF

 

PECI vs PICOF

Firstly we need to know the two common terms most frequently being referred in Payroll integrations

 

PICOF abbreviates to Payroll Integration Common Output File. (Pronounced as PeCOFF)

PECI abbreviates to Payroll Effective Change Interface. (Pronounced as Peechy)

WECI abbreviates to Worker Effective Change Interface. (Pronounced as Weechy)

 

PICOF:

PICOF is currently an end-of-life product as referred by workday which means it will no longer comes with additional enhancements or changes or features to the integration system. It does not support Effective dating / Sequence of records to represent all effective changes but provides you with the top of the stack row. Can only scan future dated transactions for worker status changes configured. Corrections and Rescinds are not well handled and there is a HTML report that is generated. In PICOF Full Extract can be indicated using an integration attribute or the Full Diff service and launch parameter. 

 

PECI:

The entire focus is shifted to PECI now. PECI vs PICOF will be driven according to how the data is expected by your payroll provider. Workday recommends to use PECI for Payroll interface integrations. 

 

PECI supports Effective dating / Sequence of records to represent all worker effective changes. PECI can scan up-to additional 2 pay periods of all kinds of worker changes; PECI connectors give more effective detailed data. PECI connector gives ability to scan for all effective changes even in future pay periods. PECI allows you to add field overrides for most of the relevant sections that e.g. allows you to handle additional fields for multiple positions correctly. PECI enables you to handle special events like termination rescind, hire rescind, corrections in a proper way, as it outputs them with the special event codes.

PECI integration template is what workday certified third party payroll providers use to get data from Workday. This is being constantly improved and new features are being added on a regular basis. It can run up to 50 pay groups per one instance. If you have more than that, you can categorize the PECI by region based to keep the limit of pay groups per instance to less than 50. 

In PECI Full Extract is indicated using a launch parameter. PECI is simplified to use less attribute configuration in comparison with PICOF. You can run PECI in Full Snapshot (launch parameter), this will give you ALL current data not just changes only.

 

Corrections and Rescinds especially for Hire, Term and some Leave events are better handled with unique event codes in the xml. You have additional control of reporting the transactions from the pay groups and recently Workday added new functionality to track Last Date Extracted at worker level

 

PECI has the limitation of handling only 150,000 worker records. As this is quite a new solution when it comes to Workday Connectors having some minor glitches, but still it's one of the most powerful connectors currently available in Workday.

 

Effective Stack change detection in PECI allows you to capture all the changes between the two integration runs with the corresponding effective and entry date vs one snapshot per Employee in PICOF where there is a risk of data loss in case if there were multiple changes to the same piece of data between 2 integration runs

 

If you are just trying to use change detection logic that PECI uses, you can also use Worker Change Effective Interface template. Both these integration templates use workday DIS Service to produce effective changes. Also, the tenant has to be Grid Enabled by Workday if you plan to use PECI or WECI.

RReports

 Reports:

Developed a address change report based on the range dates.

Developed a Terminated employees with benefits. 

Wednesday, January 19, 2022

Transport

 

Solution - Migration tool

Solution


This is the feature used for migrating the objects / artifacts from one Tenant to the other Tenant.

You can create a new Solution or edit an existing Solution. And manually add one or more Workday Configurations to the Solution.

Check for the below Tasks

 

Most frequently used Configuration Types are:

- Custom Report
- Integration System
- Business Process Definition
- Cloud Collection (Studio Project)

Create Solution Task  :

 

 

Select one of these options after you add your configurations:


Save Solution Saves the Solution in your tenant. You can access the Solution using the View Solution report.

Save and Publish Saves the Solution in your tenant, and starts the Publish Solution task. You can share it with others in the Solutions Library.

Save and Migrate Saves the Solution in your tenant and starts the Migrate Solution task. Migrate the Solution to another tenant to which you have access.

View the existing Solution Task:


*******

Workday Object transporter (OX) is used for the migration of objects from one tenant to other

Object Transporter can be used to migrate the  objects from one tenant to another tenant. 

HCM Core

Talent

Compliance

Absence

Benefits

Recruiting

Payroll and

Cross application services (reporting, Integrations, Business process etc.).

We can migrate most of the reporting components like Analytic data sources, calculated fields, custom dashboards, custom data sources, integration systems, trended worker setup, prism analytics datasets.

OX cannot be used to migrate security groups that are part of configurable security in Workday.

In real time project ,all development is carried out in the Implementation tenant and later migrated to production environment.

Actions-instance-migrate

Object transporter window will be launched. Click on launch object transporter.

We need to select the Target tenant.

Here we can see two options:

Login to target tenant: Select to sign into the target tenant with a different account than the one you used for the source tenant.

Use SSO, skip target tenant login: Select to sign in to the target tenant with the same account as the one you used for the source tenant.

 

Once the migration is done then Object Transporter compares the tenants to detect any differences, and displays the View Diff Screen for the report.

Select View Diffto see the differences between values in the source and target tenants.

If the object doesn’t exist in the target tenant, Workday describes all the values as new.

In case the report is already in the tenant,then Workday might describe values as changed or removed.

If there are unexpected differences, return to the source tenant and resolve them, then migrate again.

Select Migrate to review your migration before merging the values.

Select Submit to migrate the object to the target tenant.

Object Transporter displays the result of the migration. If migration is successful, the object is now available in the destination tenant.

 

Migration of two or more reports:

First, we need to create a configuration package so that we can combine two or more reports as a batch file for the migration.

Search for create configuration package.

Write configuration package name and select the Implementation types to migrate as reports and integrations as we need to migrate the reports.

Within the reports and integrations select the custom reports

In the new window we need to select the edit button to add the required custom reports into the configuration package.

We need to scroll and select the custom reports from the list of the custom reports in the source tenant.

Click on the migrate button

Object transporter window will be launched

Same procedure again

 

 

 

 

 

.

 

wq4

 

Workday Security Interview Questions

 

There is no inheritance for business process security policies (true / false)

 

True

 

 

Roles are used to drive business process management (true / false)

 

Yes

 

 

Which type of security groups is optional and customer-defined?

 

Job Based Security Group is optional

 

 

What type of Security Group are these: Report Writer; Setup Administrator ?

User Based Security Group

 

Editing a security policy takes effect immediately? (true / false)

 

False (Need to ‘Activate Pending Security Policy Changes)

 

 

The following are true about User-Based Security Groups

 

Grants access across the system

 

Multiple people can be members if same user-based security group

 

 

Is it possible to activate a previous timestamp while making changes needed to fix present security configuration?

 

  Yes
   

 You may configure securable actions and securable reporting items in a domain security policy.

 

 False

 

 

The following report views permissions the specified user has an action & also security policies and groups that grant access

 

 Security Analysis for Action

 

 

What are the different ways to assign security groups?

By the system based on a process

Manually

 

 Is Report Writer a role-based security group

No

 

 

  Which of the following is not securable area of business process

 

 Create new sub-processes

 

 

 In case a secured item is included in more than one domain security policy, workers who are granted different levels of access permission in different domains get the most access granted

 

  True

 

 

The following report views all domain security policies and business process security policies that use the security group:          

 

      Action Summary for Security Group


  Editing a child security policy does not affect inheritance in any of the others

 

 True

 

 

 Which Security Group is required for you to access custom reports 

 

  Report Writer User Based Security Group

 

 

  Can a role-based security tag to more than one org?

 Yes

 

 

  In Security Breach, whom should you contact?

  security@workday.com

 

 What are the steps to create Role Based Security?

 Steps-Org Role>>Maintain Org Role>>Attach the Role

 

 

 What are the two components of Workday Security?

Domain Security

 

Business Security

 

 

 How to disable Functional area?

Maintain Functional area

 

 

How to activate security policy?

    Activate pending Security Policy

 

 

What determines access to landing page?

Security

 

 

Which Report is used to see the Security Policy?

View Security for Securable Item

      Defined tasks and reports that are functionally similar

      Domains

 

 

This dictates who can view / modify data w/in the domain

Domain Security Policies

 

 

What dictates who can participate in the business process

Business Process Policies

 

 

Type of security group automatically assigned based on user’s job criteria

Job based security group

 

 

   Security policies designate permissions for security groups to view, or view and modify tasks within the domain

      Domain Security Policy

 

 

     Security Policies contain such securable items as initiation steps, step actions, and actions on the process as a whole

      Business Process Security Policy

 

 

Can you reassign a task to anyone?

No (It can be assigned to the users who have relevant security group in BP Security Policy).

 

 

Which dictates who can participate in BP?

Business Process Security Policy

 

------------ are assigned to users  based on administrative responsibility

  User-based

 

 ------------ are found as a related action off worker’s name

  User-based

 

 ----------- are assigned to users are based on criteria selected

  Job based

 

 ------------- are used to only approve business process management tasks; they do not determine task or report access and cannot initiate a business process

Job roles

 

 --------- report views all details about security group membership, security policies in which the group is used, the permissions it has and the functional area

  View Security Group

 

 ------- is automatically assigned based on criteria selected

Job based

 

 ------------- is used to restore inheritance in a child policy

Use Parent Permissions


***************

Reporting Interview Questions

 

What are Advance reports?

Advanced reports enable you to perform many actions on your data from primary and related business objects, including: Counting, Grouping, Summarizing, Totaling.

Output format of these reports can be table and charts.

 

Which filter would execute first? Filter or sub filter?

Sub filter will execute first. Because sub filters are applied on related business object, so it will filter most of the data using sub filters and then remaining data using filters.

 

What is RAAS?

RAAS is a normal report which is web service enabled. Making a report as web service enable will help to call that report in EIB, studio Integrations and BIRT. Otherwise, we cannot call that report in EIB, Studio or BIRT.

 

What are the steps to create a report?

Choose Report type and Data Source>>  Select Objects and Fields>>  Order Columns>>  Sort Output>>  Define Filter Criteria

 

What is Workday Reporting? What are the types of workday reports?

Workday reporting is a tool to gain information on data which is stored in workday. This information can be in table format, chart format etc.

 

Types: There are 2 types of Workday Reports. Custom report, Standard Reports.

Standard Reports are again of two types.

Xpresso Reports:

    These reports are delivered reports. User cannot edit these reports. User can only run reports for which S/he have access to.

 

Report Writer:

These reports are delivered reports. User can not directly edit these reports. User have to copy these reports and then user can edit that report.

 

Custom reports:

These are the custom reports created by user using report writer tool. The task to create custom report is “Create custom report”. The person who create the report is owner of that report.

 

How to make report as web service enable?

There are 2 ways to make a report as web service enable.

While creating an advance report, you can find a checkbox to make report as web service enable.

After creating a report, you can also go to advance tab and select web service enable checkbox. This way you can also disable report as web service, so it cannot be used in EIB, Studio and BIRT. 

 

What is difference between advance reports and simple reports?

Simple reports will not have option to sub filter, prompts and will have less functionality, wherein advance reports will have these features.

Also, simple reports cannot be used as web service.

 

The Tab on the Report definition allows you to control the order in which data will be presented and grouped is

Sort

 

Which Report cannot publish Web service?

Simple

 

What is the task to convert a report from simple to advanced?

Related action >> custom report >> Change to Advanced Report type

 

How do you compare the WD reporting with Relational DB?

Data Source           - View 

Object                    - Table 

Related Object       - Child Table 

Class Report Field - (CRF) Column 

Instance                 - Row

 

What is Matrix Report?

Matrix reports are similar, but not identical to, pivot tables and cross-tabs found in other systems. You group data in a row group and optionally a column group. Values in the matrix cells display aggregate values scoped to the intersection of the row and column groups to which the cell belongs.

 

What is RAAS?

You may create custom reports and enable them as a web service to be used in an Outbound EIB (Enterprise Integration Builder) as a data source. If you select this option, then you must also define Column Heading Override and Group Column Heading values on the Columns tab, and provide Label Overrides for all prompts on the Prompts tab.

 

What is Worklets?

A worklet is a report that can be displayed in a "tile" on the Workday "landing pages", which are: My Workday, All About Me, and My Team, and the Dashboard slide-out. Worklets provide users quick access to frequently referenced data and tasks common to a specific functional area.

You can create your own worklets by using the Report Writer and specifying either the advanced or the matrix report type, and then selecting Enable As Worklet on the Output tab. If you choose to share a worklet, it becomes available for authorized users to select when configuring their Workday landing pages.

 

What is Trended Worker Data source?

Trended Worker Data source encompasses a number of fields that fall into 3 general categories: 

Monthly worker snapshots. This type of data includes data about  workers as of the last day of the month, including compensation data, headcount numbers, and biographical information. 

Staffing events. These include hires, terminations, transfers, promotions, changes in position, addition or deletion of additional jobs, move events, and international assignments. 

Calculated metrics. These are calculations ,we can make based on the trended data, such as turnover rate and span of control. 

Workday automatically updates the Trended Workers data source at the end of each month. Data is collected for the last 36 months (that is, data is collected for as many months that are available in Workday, up to 36 months). Any data older than 36 months is automatically purged from the data source. Additionally, any retroactive changes that have been made to a worker in the last 3 months are automatically incorporated into the trended data.

 

What is Trending report?

Using Trending Report, Workday enables to report on and analyze trends in worker data such as headcount and attrition through a number of Workday delivered standard reports. We could create custom Trending report types that use trended data. By using either standard reports or custom reports, we can analyze important trends in our workforce directly in Workday, without the need for a third-party analytical tool. 

At the core of all trending report types is the Trended Workers data source. 

 

What is Indexed Data source?

Indexed data sources are a special type of data source optimized for performance, aggregation, and faceted filtering on large volumes of data.

 

Can custom  field be used in Report?

Yes.

 

What are the different types of custom reports? 

Simple, Advanced, Matrix, nBox, Search, Simple, Transposed, Trending.

 

What is the difference between Filter and Sub-Filter?

Filter is used to provide filter condition for Primary Business Object and Sub-Filter is used to provide filter condition for Secondary Business Object

 

 

 

Additional Reads

 

Workday Standard Reports

Workday Custom Reports

Workday EIB Interview Questions

Workday Security Interview Questions

Workday Core Connectors Interview Questions

at May 09, 2020 

Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Labels: Interview QuestionsWorkday Core HCM Interview QuestionsWorkday Interview questionsWorkday ReportingWorkday Reporting Interview Questions

Location: Gachibowli, Hyderabad, Telangana, India

Friday, 10 April 2020

Security

 

Security Terms


Security Groups -
A collection of system users used to grant access to Workday. Security Groups are added to security policies to give members permissions to secured items in Workday. Group of users who need to perform actions or access data

Domain Security Policy-
Rules that dictate which security group can view or modify data within the domains

Components of Configurable Security:

Security Groups

Domains

Domain Security Policies

Business Processes

Business Process Security Policies


What are the 3 types of security constraints?

Unconstrained: members have access to available data instances

Constrained: members will only have access to data for assigned constraints

Mixed: Members have a mix of constrained and unconstrained


User-based security groups-
These groups are assigned manually to individual users to grant tenant wide access in Workday. Usually intended for administrators that needs system wide access.

Two types of Security Policies-
Domain security policies and Business process security policies.

Domain-
Domains are a collection of items that share the same security, including:
- Tasks
- Reports and report fields
- Web service operations

Domain Security Policies control which security groups have access to data in the domain
- View Security for Securable Item Report

Functional Area-
Represent the main grouping of delivered domains and BP types. These groupings are typically for a specific module or area of Workday, such as Procurement, Integrations, or Personal Data. Functional areas can be enabled or disabled.

Functional Area Report-
Functional Areas report is a "top-down" report which allows you to see a top-down view of Workday functional areas and the domains and business process types in each

Business Process Security Processes-
Business Processes Security Policies control which security groups can participate in the business process (initiate, perform actions, approve, cancel, delegate, etc.)
Have to give permission for multiple policies (ex. Approve, review, etc.)
Each business process type has a single security policy that secures all business process definitions of its type

Steps for Configuring Security:
1. Identify users- who needs access to what?
2. Create security groups- identify existing security group or create a new one for your employees
3. Edit Security Policies- grand view/ modify permissions to domains or grant business process permissions (sometimes domain OR business process or sometimes combo of both)
4.Activate Pending Changes to take effect
5. Test Changes to verify changes made provide the expected access (for both those who got access and those who don't need access)

Workday-Assigned Security Groups
These Security Groups grant GENERAL access and are AUTOMATICALLY assigned by the Workday system
- Assigned to a person
- Based on process such as hiring/ terminating
Ex. Employee as self, worker, all employees, all users, manager's manager

User-Based Security Groups-
These Security Groups grant ADMINISTRATIVE access tenant wide- typically for maintenance/admin groups
- Responsibility applies throughout the system (not just supervisory orgs but for entire tenant)
- User-based security groups are manually assigned to a worker
- Multiple people can be members of the same user-based security group
○ Ex. Benefits admin, compensation admin, payroll admin, report writer, HR admin, etc.

Steps for Creating a User-Based Security Group:
1. Create user-based security group
2. Configure security group on security policies
3. Activate pending security policies
4. Assign users to security group
5. Test (user can create an exit interview, testing it on who should be able vs who should not)
*Don't forget to add group for "administered for security groups" like Security Administrator, otherwise they wont be able to access anything

Role-Based Security Groups:
These Security Groups help identify your support or leadership staff
- Membership is derived based on being assigned an organizational role
- Roles are assigned to organizations (or location hierarchies)
- Roles are assigned to positions, NOT workers
- Roles inherit from superior org if not filled (if configured to do so)
- Access can be defined as constrained and unconstrained

Steps for Creating a Role-Based Security Group:
1. Use "maintain assignable roles" to create or modify assignable roles (supplemental book page 34-35)
2. Create role-based security group
3. Configure security group on security policies
4. Activate security policy changes
5. Assign roles to jobs/ positions to organizations
Test

Job-Based Security Group:
Identify members based on a job criterion

Job profile

Job category

Job family

Management level

Work shift

Include exempt jobs

Include non-exempt jobs


Automatic membership, Can be constrained or unconstrained

Membership-Based Security Groups:
     1. Location (meant for more specific location, not US as a whole)

            Grants access to a task based on the location for a worker
            Once created, automatically assigned based on users location
 Example: for initial deployment of time tracking, only London workers enter time on Workday

     2. Organization
             Grants access to a task based on the user's membership in org
             Once created, automatically assigned based on organization assignments
Example: business unit, company, cost center, pay group, USA as a whole, etc.

Combination Security Groups:
    1. Intersection -
            Grants access based on membership in ALL of the included security groups
            Includes only users who meet all of the specifications
    2. Aggregation Security Group -
            Includes users who are in ANY of the selected security groups
            User does not have to be in every included group

Security Domain
A predefined set of related securable items that include reports, tasks, report fields, data sources, and data source filters
- The securable item that make up a domain cannot be changed
- Each domain has its own security policy that controls access to the security items

Which security group is assigned directly to a worker?
User based security-Tenant wide

Role based security group permissions are given to a worker when their position is linked to what?
Support Role

Editing a security policy takes effect immediately
False- Need to activate

Business Process Policies-
Defines which security groups can participate in the business process

Security group that allows self service access?
Employee as self

Groups of users who need to perform actions or access data?
Security Groups

 

 


Global fields

 

The Business Object - Global contains various Global fields which are variables and constants that you can use in your BP rules, Custom Reports, and for your scheduled recurring processes.

Example: In a scenario where you wanted to get constant value for your report like 'TEST' or  '1', you can rely on the Global fields.

To see the Report Fields from the Global Business Object, Open the Report - Report Fields.

Also we can create custom Global fields by creating calculated fields with a business object of Global.

From Search bar accessing your business object:

View of the Report Fields, notice the number of fields available.

WWS

 

Workday Web Services (WWS)

To access the Workday web services, you do not need community access. You can simply search on GOOGLE and find the links as shown below.

This link below holds all the versions of workday web services. Click to view.

VERSION DIRECTORY
This link below shows all the public web services that you can access and the detailing of its attributes and properties. Click to view.

Workday web service:
Example below:
Human Resources is the Service
Change_Emergency_Contacts is the operation that you can perform.


As of today Jan 15th 2020, there are 43 broader services that you can find. Each of these services contain Operations.

You will be able to download the wsdl and xsd definitions.


WSDL - Web Services Description Language

XSD - XML Schema Definition


Also notice that if any services were deprecated, they will be shown next to the operation.


EIB

 

Workday EIB Interview Questions


Here is the list of Interview Questions related to EIB - Enterprise Interface Builder Integrations.

What is EIB and what are the types of EIB?

EIB - Enterprise interface builder tool which is used to build simple inbound and outbound Integrations to connect workday with external endpoints.

Types:
      Inbound
     Outbound 

How many steps are involved in creation of an EIB?

3 Steps / Phases

Get Data, Transform, Deliver

What are outbound EIB?

Outbound EIBs are used to export data from workday. We can also send this exported data to any external vendors or legacy systems through different endpoints such as SFTP/FTP etc.

E.g. Send Dependents data to Benefits vendor from workday.

 

What are Inbound EIB?

Inbound EIB Integration are used to upload data into Workday from external endpoints or from spreadsheets.

E.g. Inserting One Time Payments, Inserting Bonus Data, Update Emergency Contacts 

We can upload data to workday using spreadsheet attachment or external file from SFTP/FTP/EMAIL locations.

 

What are the main types of Workday Integrations?
          Workday Studio Integration, 
          Enterprise Information Builder (EIB) Integration, 
          Cloud Connect Integration.

How do you choose which tool is best out of three integrations available?

Few things needs to be considered while choosing the integration tool. Here is what you need to identify first in place.

Is the solution already pre-built? Am I connecting to a third-party vendor with a solution already in place? – If yes, most likely you will choose a Core Connector (Packaged Connector).

 

Does this integration just need to export or import some data into Workday? – If yes, then most likely you need to go with EIBs.

 

Do I need to execute several rules, and reports to get the data and calculate the results I need? For example: Determining payroll between Exempt and Non-Exempt employees, calculate deductions, etc. – If yes, then most likely you need a Workday Studio Integration.

Can we create an EIB with the help of matrix report?

No, the reason being reports need to be Web Service enabled for creating EIB and Matrix reports can’t be Web Service enabled.

 

Can we use all advance reports as a data source in EIB?

 No, we cannot use all advance reports in EIB. We can use only those reports which are web service enabled.

Can we use simple reports as a data source in EIB?

No

What are the types of transformation allowed with EIB?
We can use 3 types of transformation with EIB:

Custom report Transformation -This type is inbuilt transformation of EIB and have limited functionality.
Custom transformation - In this we have to attach XSLT with EIB and supports XSLT functionality. So, this has more features than Custom report Transformation. Learn here w3schools
Document Transformation -This is type of connector that we can connect with EIB and will supports all functionality of Document transformation such as XTT and ETV.

What are the limitations of EIB?
Only one data source can be used. And only one destination point can be configured for one tenant. Can’t define output tag in EIB.

 

What data sources can we choose while creating the EIB outbound?
EIB outbound is to export the data from Workday.
Data Source - Custom report or Web Services or REST URL

What data sources can we choose while creating the EIB Inbound?
EIB Inbound is to Import the data into Workday.
Data Source - Attachment or External file or REST Endpoint

 

Name some Web services that you have used for inbound EIB Load?

Request One-Time Payment (OTP)

Change Emergency Contacts

Request Compensation Change

Terminations

 

While performing EIB Inbound load what should we do to avoid get pending actions / Tasks in inbox?
This represents, when you do a load through EIB the underlying BP/task should get complete without going for any approvals. Because your load may be huge , say 10,000 EE bonus data you are loading at that time, there shouldn't be any workflow triggering for approvals. So, while filling the Inbound Spreadsheet template, we need to select “Automatic processing” on first tab. This will skip the BP's

Where can you view Error messages for an EIB?

You can view the EIB run through Integration Events , Process Monitor

 

Name some input and output types for EIBs?

Input:   SFTP/FTP, REST, or attachment 

Output: SFTP/FTP, HTTP, Email, CSV, JSON, XML, etc

 

EIB Integration issues with Scenarios and Resolutions

 

Scenario 1: The EIB does not display in the integration prompt of the Launch/Schedule Integration task.
Resolution: Verify EIB security Configuration. Edit the EIB and resolve any critical errors.

Scenario 2: Non-legible character appears in Microsoft Excel when you open a CSV output file.
Resolution: Before opening the CSV file in Excel, open the CSV in notepad , Then select File>>save as, UTF-8 encoding.

Scenario 3: File name does not include generated date and time variables when the sequence Generator is configured correctly.
Resolution: When launching or scheduling the EIB, Use these settings with the file name launch parameter.
Value type: Determine value at run time
Value: Next sequence for integration File Utility.

Scenario 4: Workday returns the following error message: Root Cause: BadRequestException: Error code: unknown Response: 500: Processing error occurred. No value provided for required [Prompt Name].
Resolution:  Ensure that all required prompts are being populated when the EIB is launched. You may have to edit the scheduler if the EIB was launched from there.

Scenario 5: Workday returns the following error: Transform failed at component: HandleTransform.request.0.XsltTransform. Reason: Output character not available in this encoding

Resolution: 

Open the XSLT transformation file in a text editor.

Find the element <xsl: output>.

Within that element, search for the setting for encoding=.

Often this is set to ISO-8859-1 Change this value to UTF-8.

If the recipient of the EIB cannot accept UTF-8-encoded files, then you must change the source data in Workday.

 


*******

The big advantage with Core Connectors is the Change Detection. Which helps in generating the outbound files with the change data / delta data.


Most of the times, the requirement will be to generate the full file for the first time run and later on the change file.

Example: 

Worker demographics data - on Jan 1st 2020. - Send Full File as it is the first time for the vendor. Then here on 1st of every month send the change file. i.e. difference in data from Jan 1st to Feb 1st. It could include new hires, terminations and any other requested data changes for the said duration. It goes on every month. - Best accomplished with Core Connectors.

Through EIB also you could achieve the change detection, however it is not as simple as selecting the parameters during the launch.

Lets say, if the requirement is to send full file as output every time, we use EIB as the integration system.


************

How to Run EIB Inbound in Validation mode:

When you want to load some data into Workday, you typically use the EIB Inbound. You know you will use the three phases involved in EIB - Get Data, Transform Data, Deliver Data.


Its always a good approach to run your EIB Inbound integration load with Validation Only Load.

 

This helps you in identifying the issues so that you can fix it and proceed with the actual load.

 

Below shown is the screen when you click on Launch/Schedule integration. Here is where you set the Validation Only Load. When you are comfortable with the load validation, in the next launch just make sure that you don't select so that your run will not be a Validation only but an actual load.



Workday EIB Inbound - Validation Mode Setup


******

EIB - Inbound Template Processing Instructions

Processing Instructions

 

While loading your file for EIB - Inbound, you will see the Processing Instructions Options to choose on your Overview Tab in the excel template.

 

Sample Hire Employee Template:

 

 

Here is the detailing on these BP related processing selection. Most widely used is Automatic Processing which avoids the approval workflow.


 


HTML2

 1. <HTML> <HEAD> <TITLE>RAJ BLOG</TITLE> </HEAD> <BODY> <H1>Raj documents</H1> <H2>Ra...