To unlock and create growth
Integrated solutions designed for enterprise-wide results. These offerings make the most of your investments in both technology and people.
Health Administration | Employer Solutions
To better wellbeing
Solutions to help employees and employers choose, use and manage their health benefits.
Wealth Administration | Employer Solutions
To build a future
Solutions to help employees and employers choose, use and manage their wealth benefits.
Payroll Administration | Employer Solutions
To keep spend in shape
Solutions to administer, optimize and scale your payroll.
Engagement and Communications | Employer Solutions
To spark interest
Solutions to create a more memorable employee experience.
HCM and Financial Management | Professional Services
To keep things running smoothly
Solutions to better manage your workforce from the cloud.
Finance is moving to the Cloud ...are you ready?
The Advantages for Health Saving Accounts (HSAs): Employees find balance between health and wealth
The Advantages fo Health Saving Accounts (HSAs): Employees find balance between health and wealth
WORK WITH US
FEATURED CASE STUDIES
Curtiss-Wright: Increasing utilization and satisfaction with an integrated benefits platform
Pathway Vet Alliance: Thriving in the cloud with Alight and Workday
Workday provides an extra layer of security through their authentication policy. Not only does this help protect your data but it allows you to determine how and where data is shared depending on how it’s accessed.
Whether you’re signing up for a new credit card or distilling information down to employees within your organization, everyone is conscious about keeping their data safe and out of the hands of those who don’t need it. And in today’s growing and constantly changing cyber world, it’s important to keep up with these changes and take the necessary steps to ensure your personal, employee and customer data is safe and secure.
See how an authentication policy can improve your data security.
Keeping your data safe and secure in today’s growing and changing cyber world is a top priority. Anytime a company’s data or system(s) is compromised it hurts their reputation and often leads to a lack of confidence for both employees and customers. To help prevent this, Workday provides another layer of security that helps protect your data.
This added level of security provides you with additional protection against data exposure and gives you the ability to restrict access to Workday. Workday’s authentication policy, a powerful tool to help defend against unwanted parties accessing your system, ensures only the appropriate data is shared. The most critical and important piece of security is to make sure your data is safe and secure. If you have not already implemented Workday’s authentication policy, now’s the time to learn more so you can get started on it.
Authentication policies determine how users can access your Workday tenant either by blocking networks or establishing setup rules that determine how users sign in. Workday’s authentication policy allows you to restrict access to your system by:
Only allowing users to access from a list of approved IP addresses or ranges.
Limiting access to users based upon method of authentication. For example, you can limit what employees can do when off your company network versus what they can do while on your company network. Considerations on what to restrict when off your company network include:
Sensitive information whether it needs to be viewed and/or transacted upon.
Certain transactions such as payment elections or tax elections where the unmasked Social Security number (SSN) is viewable.
Phone numbers, addresses, dependents and beneficiaries.
Any non-applicable data and transactions for former employees or other groups of employees.
Authentication policies can be setup for each of your tenants allowing for the flexibility to give different access in your implementation, sandbox and production tenant.
The benefits of using Workday’s authentication policy include the ability to:
In addition, the authentication policy adds another layer of protection to mitigate risk of unwanted users getting access to critical data. Such a security breach could lead to any or all of the following:
Implementing an authentication policy will provide you with a more granular level of control with user authentication. You can configure the following to tailor the authentication policy to your company’s requirements.
Tip: Arrange your authentication rules in decreasing levels of restriction as Workday evaluates the rules in the order they are listed. The first rule that the user matches will be the authentication policy that is applied.