Skip to main content

Workday Integration Guide (HRIS)

Making the initial connection to Workday

Updated today

Connecting Workday to Drata allows for automated checks and evidence collection to provide details on personnel hire and separation dates as well as their employment status.

Key Capabilities

  • Personnel synchronization: Syncs employment status, hire dates, and key personnel attributes from the HRIS.

  • Lifecycle classification: Uses HRIS data to detect hire and termination events that support onboarding and offboarding compliance requirements.

  • Read-only ingestion: Retrieves HR data using read-only access without modifying information in the HRIS system.

Prerequisites & Data Access

  • Administrator access to your Workday tenant

  • Ability to create:

    • An Integration System User (ISU)

    • An Integration System Security Group (Unconstrained)

  • Ability to maintain and activate domain security policies

  • Must be assigned one of the following Drata roles: Admin, Workspace Managers, DevOps Engineer.

  • If you have the Access Reviewer Drata role, you can only view the Connections page.

Permissions & Data Table

Permission / Scope

Why It’s Needed

Data Accessed (Read Only)

Worker Data: Public Worker Reports

Minimum required HRIS visibility

Worker identifiers

Worker Data: Employment Data

Determine hire and termination dates

Hire date, termination date, status

Worker Data: Current Staffing Information

Determine current employment state

Active/inactive status

Worker Data: Workers

Retrieve personnel records

Worker metadata

Worker Data: All Positions

Retrieve job and position details

Job title, position

Worker Data: Organization Information

Surface org hierarchy

Department, manager

Person Data domains

Retrieve identity and contact details

Name, work email

Reports / Payroll / Time Off (if enabled)

Support optional HRIS data visibility

Payroll, time off, timesheets

Step-by-Step Setup

Step 1: Create a Workday ISU

  1. In your Workday portal search and click on Create Integration System User.

  2. Create a User Name and Password then click OK. This User Name will be used in the next section as well.

    • The username will be used later when connecting to Drata.

    • Do not enable “Require new password at next sign in.”

    • Passwords must not contain &, <, or > characters.

To prevent password expiration:

  1. Now search and click on Maintain Password Rules.

  2. Add the ISU that you just created to the section that says System Users exempt from password expiration.

  3. Save the Integration System User name and password. You will need it during the connection process.

Expected outcome:
You have a non-expiring Integration System User ready for the integration.

Step 2: Create and add user to the Security Group

  1. Search and click on Create Security Group

  2. On the Create Security Group page:

    1. Type of Tenanted Security Group: Select Integration System Security Group (Unconstrained)

    2. Name: Enter a name

  3. Select OK.

  4. On the Edit Integration System Security Group (Unconstrained):

    1. Name: Enter a name. Remember the name. You will use it in the next step.

    2. Integration System Users: Enter the same name you entered when creating the ISU in the first section

  5. Select OK.

Expected outcome:
The ISU is assigned to a security group that will control its access.

Step 3: Configure Permissions

  1. Search and click on Maintain Permissions

  2. Ensure Operation is Maintain.

  3. Enter the security group name you created in the previous section for Source Security Group.

  4. On the next screen, add the corresponding Domain Security Policies Permissions:

Operation

Domain Security Policy

View Only

Worker Data: Public Worker Reports
This is the minimum required permission

Get Only

Manage: Organization Integration

This is required to surface the Organization Hierarchy

Get Only

Worker Data: Organization Information

Get Only

Person Data: Name

Get Only

Person Data: Personal Data

Get Only

Person Data: Home Contact Information

Get Only

Person Data: Work Contact Information

Get Only

Person Data: Private Work Email Integration

This is required to surface work email of Employees

Get Only

Person Data: Public Work Email Address Integration

This is required to surface work email of Employees

Get Only

Worker Data: All Positions

Get Only

Worker Data: Compensation

Get and View Only

Worker Data: Compensation - All Worker’s Positions Past and Present

This is required to surface Employee compensation

Get Only

Worker Data: Compensation by Organization

Get Only

Worker Data: Current Staffing Information

This is required to surface Employment Status of Employees

Get Only

Worker Data: Employment Data

Get Only

Worker Data: Workers

Get Only

Reports: Pay Calculation Results for Worker (Results)

Get Only

Worker Data: Payroll

Get Only

Process: Export Time Blocks

This is required to retrieve Timesheet Entries

Get Only

Worker Data: Time Off*

*Specific instructions to allow access to Time Off data

can be found here.

Expected outcome:
The security group has the required read-only access to HRIS data.

Step 4: Activate Security Policy

We'll need access to your specific Workday web services endpoint:

  1. Search and click on Activate Pending Security Policy Changes

  2. Review the pending changes.

  3. Add comments if required.

  4. Approve and activate the changes.

Expected outcome:
All domain security permissions are active.

Step 5: Validate Authentication Policy

  1. Search and click on Manage Authentication Policies

  2. Click Edit on the authentication policies row

  3. Click the + icon on the left to create a new Authentication Rule

  4. Enter an Authentication Rule Name name.

  5. Select the Security Group that you previously created

  6. Under Allowed Authentication Types” select Specific < User Name Password or Any.

Expected outcome:
The ISU can authenticate successfully using username and password.

Step 6: Activate pending auth policy changes

  1. Search and click on Activate Pending Security Policy Changes

  2. Proceed to the next screen and confirm the changes

  3. This will save the Authentication Policy that was just created or edited

Expected outcome:
The updated authentication policy is active and enforced.

Step 7: Enter your Web Services Endpoint URL

  1. Search in Workday for Public Web Services

  2. Open the Public Web Services Report

  3. Hover over Human Resource and click the three dots to access the menu

  4. Click Web Services, and then click View WSDL

The WSDL opens in a new browser tab as a text-based (XML) page.

  1. Scroll down and locate the line that contains the service address URL (the value inside the soap:address location field).

  2. Copy the full URL.

  3. Paste this value into the Web Services Endpoint URL field in Drata.

For the following URL path /service/acme/Human_Resources/v42.1 you would copy this: https://services1.myworkday.com/ccx/service/acme/Human_Resources/v42.1

Expected outcome:
You have entered the correct Workday Web Services Endpoint required to complete the connection.

Did this answer your question?