Authorization

When you add a Workday card to a flow for the first time, Okta Workflows prompts you to configure the connection. This connection links to your Workday account and saves your account information, so you can reuse the connection for future Workday flows.

You can create multiple unique connections and manage them from the Connections page in the Okta Workflows Console.

Before you begin

You need the following elements to create a connection to a Workday account:

  • Administrator authority on Okta Workflows.

    In addition to the initial authorization of the connector, reauthenticating this connection requires an account with super admin privileges.

  • A Workday account that has permission to create an Integration System User, create and edit security groups, and edit security policies for business processes.

    Alternatively, access to a Workday account with security permissions to view worker data and change worker contact information.

Procedure

To establish a connection, you can use an existing Workday account or an Integration System User account.

Okta recommends using an Integration System User because it can be a company account that isn't tied to a particular individual.

Create an Integration System User in Workday

  1. In the Workday console, type Create Integration System User in the search box.

  2. From the search results, click Create Integration System User.

  3. Follow the directions to create a username and password and record those credentials for future use.

  4. Leave the Do Not Allow UI Sessions option cleared, because you need a UI session to perform the authentication.

Grant permissions to the Integration System User

To use the Workday connector, follow these procedures to grant the necessary permissions to the Integration System User.

Create a security group

  1. In the Workday console, type Create security group in the search box.

  2. From the search results, click Create Security Group.

  3. From the Type of Tenanted Security Group dropdown menu, select Integration System Security Group (Constrained) or Integration System Security Group (Unconstrained).

    You can specify which organizations to include in a constrained group. However an unconstrained group includes all organizations.

  4. Enter a name for the group, and click OK. This group name is needed in future steps.

  5. Add your Integration System User to the list under Integration System Users.

  6. If you chose a constrained security group, add the orgs that you want to include. Then choose whether to apply access rights to only the current org, or to the current org and all its subordinate orgs.

  7. Click OK to finish creating the security group, and then click Done.

Add domain security permissions to the security group

  1. In the Workday console, type View security group in the search box.

  2. From the search results, click View Security Group.

  3. Select your security group from the listed results, and click OK.

  4. From the Actions menu, choose Security GroupMaintain Domain Permissions for Security Group.

  5. Under Report/Task Permissions, grant the following domain security policy permissions to your security group:

    Domain Security Policies permitting Modify access

    Person Data: Work Contact Information

    Domain Security Policies permitting View access

    Worker Data: Current Staffing Information

    Worker Data: Public Worker Reports

    Reports: Organization

    You may need to add other domain security policy permissions to support viewing custom objects.

  6. Optional. To find the security domain of a custom object, complete the following steps:

    1. In the Workday console, type View custom object in the search box.

    2. From the search results, click View Custom Object.

    3. Enter the name of your custom object.

    4. Record the Security Domains value. This is the security domain required for this custom object.

    5. Using the process in the previous step, grant this domain security policy to your security group.

  7. Click OK to finish updating the domain permissions for your security group, and then click Done.

Add permissions to change Workday information

To use the Workday action cards that change worker information through Okta Workflows, you need to grant the security group the necessary permissions.

  1. In the Workday console, type Edit business process security policy in the search box.

  2. From the search results, click Edit Business Process Security Policy.

  3. For the Business Process Type field, type Work Contact Change and click OK.

  4. Under Change Work Contact Information (REST Service), add your security group.

  5. In the Edit Business Process Security Policy dialog, add your security segment to the field for Who Can Do Actions on Entire Business ProcessView All.

  6. Click OK to finish updating your business process security policies, and then click Done.

Manually add a security segment

If your security group isn't included in the search results of the previous step, you need to manually add it.

  1. Click CreateCreate Segment-Based Security Group.

  2. Choose a name for this new security segment.

  3. Under Group CriteriaSecurity Groups, add your security group.

  4. In the Access to Segments area, click CreateCreate Business Process Type Security Segment.

  5. Add a name for the security group and for the Business Process Type field, type Work Contact Change.

  6. Click OK to create the security segment for this business process type.

  7. Workday should return you to the dialog for security segment creation. Click OK.

After you create the security segment, it should appear in the Change Work Contact Information (REST Service) list.

Activate the security policy changes

If you don't activate the security policy changes, then Workday doesn't grant the necessary permissions to the Integration System User account.

  1. In the Workday console, type Activate pending security policy changes in the search box.

  2. From the search results, click Activate Pending Security Policy Changes.

  3. Enter a comment that these changes are required for Okta Workflows, and then click OK.

  4. Verify and confirm the activation changes.

Create an API Client

The Workday connector in Okta connects to your Workday instance using an API client.

  1. In the Workday console, type Register API client in the search box.

  2. From the search results, click Register API Client.

  3. Enter a name for your client.

  4. For the Client Grant Type, select Authorization Code Grant.

  5. Optional. Select Enforce 60 Minute Access Token Expiry.

  6. For the Redirection URI:

    • If your Okta org is on an Okta Workflows preview cell: https://oauth.workflows.oktapreview.com/oauth/workday/cb

    • If your Okta org is on an Okta Workflows production cell: https://oauth.workflows.okta.com/oauth/workday/cb/

    • If your Okta org is on an Okta for Government High cell: https://oauth.workflows.okta-gov.com/oauth/workday/cb

  7. Select the Non-Expiring Refresh Tokens option to prevent refresh tokens from expiring. Otherwise the connection for your Workday connector may break.

  8. Grant the following scopes:

    • Contact Information

    • Organizations and Roles

    • Staffing

    • Tenant Non-Configurable

    You may need to add other scopes to support viewing custom objects.

  9. Optional. This step identifies and grants any scopes required for custom objects.

    1. In the Workday console, type View custom object in the search box.

    2. From the search results, click View Custom Object.

    3. Enter the name of your custom object.

    4. Click the values associated with the Security Domains and record the Functional Areas values. These are the scopes required for this custom object.

    5. Using the process in the previous step, grant the scopes for custom objects to your API client.

  10. Click OK to confirm the changes.

  11. After you create the API client, copy the Client Secret value. This value isn't retrievable in the future, so ensure that it's recorded in a secure location.

    Also record the Client ID value, the Workday REST API Endpoint value, and the Authorization Endpoint value. Click Done.

Create a connection in Okta Workflows

  1. Sign in to Workday using your Integration System User account. Leave this connection open in your browser.

    This active session is necessary to authorize the connection in Okta Workflows.

  2. In the Okta Workflows Console, go to Connections.

  3. Click New Connection to see a list of all available connectors.

  4. Select the Workday connector.

  5. In the New Connection window, enter a Connection Nickname. Use a unique name, in case you need to create multiple Workday accounts.

  6. Enter the Client ID and Client Secret of the API client that you created in Workday.

  7. Your Workday authorization endpoint URL has the format https://{authorization_subdomain}.workday.com/{tenant}/authorize.

    Enter your Workday {authorization_subdomain} endpoint into the Authorization Subdomain field.

    Enter the {tenant} value into the Tenant field.

  8. Your Workday REST API Endpoint URL has the format https://{subdomain}.workday.com/ccx/api/v1/{tenant}.

    Enter the {subdomain} value into the Token and Endpoint Subdomain field.

  9. Click Create. Workday launches an authentication window.

    If you aren't currently signed in to Workday, you may receive a Page Not Found error. To resolve this, sign in to Workday before you establish a new connection.

  10. In the Workday authentication window, click Allow to grant permissions to the Workday connector. Workday saves your connection information and returns you to your flow.

The new Workday connection appears in your Connections list.

Related topics

Workday connector

Cards in flows

Workday Staffing API