Service Overview
Workday Security provides centralized support for requesting, updating, and troubleshooting Workday access across Finance and Human Capital Management (HCM). This service helps campus users obtain the appropriate access needed to complete their work while supporting institutional security, compliance, and governance standards.
Available Services
Request Security Role Assignment
Use this option to request new or updated role-based access in Workday.
Best for requests such as:
- Adding a Workday security role
- Updating existing access
- Removing access that is no longer needed
- Requesting access tied to Finance or HCM responsibilities
Requests will be reviewed for appropriate approvals, business need, and alignment with security standards.
Submit Request
Reassign a Task/Transaction
Use this option when a Workday task or business process transaction needs to be reassigned.
Examples include:
- Unassigned tasks
- Tasks assigned to someone who is out of the office
- Transactions that need to be corrected, rescinded, or reassigned
- Business processes such as compensation changes, job movements, or similar transactions
This service may use the existing Correct or Reassign a BP request process.
Submit Request
Delegate a Task
Use this option when a Workday task needs to be delegated to someone who is not at a lateral or higher level.
Important note:
- Delegations to someone at a lateral or higher level are normally processed directly in Workday.
- Requests outside that standard delegation path may require additional review.
Delegation requests are reviewed to ensure the delegated access is appropriate for the task and business need.
Submit Request
Access Questions & Issues
Use this option for general Workday access questions or issues.
This may include help with:
- Trouble initiating a transaction
- Trouble approving a transaction
- Questions about what you can see in Workday
- Questions about whether your access is correct
This is the best option when you are unsure which security request type applies.
Submit Request
What Happens Next?
- Our team reviews the request and confirms the correct path for resolution.
- Additional details or approvals may be requested, if needed.
- Security-related requests are reviewed for business need, compliance, and appropriate access.
- You will be notified as the request progresses.
Your Role in the Process
- Provide the business reason for the access or change.
- Include the affected worker, position, supervisory organization, cost center, or transaction when known.
- Respond to follow-up questions or approval requests in a timely manner.
- Confirm whether the issue has been resolved once access or task changes are completed.