Proven, market-leading solutions for both growing and complex organizations
Across the globe, Alight is ready to help your organization thrive
Proven, cost-effective solutions that meet your agency’s complex needs
Work with an independent partner dedicated to your success
A curated network of solutions to help your people make smarter, more proactive decisions
Alight Solutions is a leading provider of integrated benefits, payroll and cloud solutions. With more than 15,000 professionals across 29 countries, Alight provides leading-edge benefits administration and ERP technology and services to more than 3,250 clients including 50% of the Fortune 500. Alight’s combination of data-driven insights and technology expertise creates unique value for clients. Alight is a six-time member of IAOP’s Global Outsourcing 100. Learn how Alight drives better business outcomes and employee wellbeing for organizations of all sizes at alight.com.
Workday provides an extra layer of security through their authentication policy. Not only does this help protect your data but it allows you to determine how and where data is shared depending on how it’s accessed.
Whether you’re signing up for a new credit card or distilling information down to employees within your organization, everyone is conscious about keeping their data safe and out of the hands of those who don’t need it. And in today’s growing and constantly changing cyber world, it’s important to keep up with these changes and take the necessary steps to ensure your personal, employee and customer data is safe and secure.
See how an authentication policy can improve your data security.
Keeping your data safe and secure in today’s growing and changing cyber world is a top priority. Anytime a company’s data or system(s) is compromised it hurts their reputation and often leads to a lack of confidence for both employees and customers. To help prevent this, Workday provides another layer of security that helps protect your data.
This added level of security provides you with additional protection against data exposure and gives you the ability to restrict access to Workday. Workday’s authentication policy, a powerful tool to help defend against unwanted parties accessing your system, ensures only the appropriate data is shared. The most critical and important piece of security is to make sure your data is safe and secure. If you have not already implemented Workday’s authentication policy, now’s the time to learn more so you can get started on it.
Authentication policies determine how users can access your Workday tenant either by blocking networks or establishing setup rules that determine how users sign in. Workday’s authentication policy allows you to restrict access to your system by:
Only allowing users to access from a list of approved IP addresses or ranges.
Limiting access to users based upon method of authentication. For example, you can limit what employees can do when off your company network versus what they can do while on your company network. Considerations on what to restrict when off your company network include:
Sensitive information whether it needs to be viewed and/or transacted upon.
Certain transactions such as payment elections or tax elections where the unmasked Social Security number (SSN) is viewable.
Phone numbers, addresses, dependents and beneficiaries.
Any non-applicable data and transactions for former employees or other groups of employees.
Authentication policies can be setup for each of your tenants allowing for the flexibility to give different access in your implementation, sandbox and production tenant.
The benefits of using Workday’s authentication policy include the ability to:
In addition, the authentication policy adds another layer of protection to mitigate risk of unwanted users getting access to critical data. Such a security breach could lead to any or all of the following:
Implementing an authentication policy will provide you with a more granular level of control with user authentication. You can configure the following to tailor the authentication policy to your company’s requirements.
Tip: Arrange your authentication rules in decreasing levels of restriction as Workday evaluates the rules in the order they are listed. The first rule that the user matches will be the authentication policy that is applied.