Skip to main content

Workday

Omada version badge REST API

This connectivity package allows implementing Workday as an authoritative source of identity data for Omada Identity, providing support for reading worker and organizational information.

Supported objects and operations

Workday objectsOmada Identity data modelOperations
WorkersIdentityRead
Supervisory OrganizationContextRead
LocationContextRead
CountriesContextRead
Job titleContextRead
Identity and supervisory organizationsContext assignmentRead
Location and workersContext assignmentRead
Countries and workersContext assignmentRead
Supervisory organization and managersContext ownerRead

Minimum required permissions

Only administrators can get the authorization credentials required to connect to the Workday API.

Implementation notes

Ensure that you complete the procedures listed in the Additional configuration section to allow the correct alignment of context data between Workday and Omada Identity data models.

Network requirements

N/A


Prerequisites

The following section describes how to get permissions to access specific data from Workday as well as client ID and client secret. It is required for seamless integration with Omada Identity.

  1. Log in to your Workday instance.

  2. Create your API client for integration and choose Scope (Functional Areas) as Organizations, Roles and Staffing. Save your client id and client secret.

  3. Create your Integration System User (ISU).

    1. In the search field, search for Create Integration System User.
    2. Enter username and password. Click OK.
  4. Create the security group.

    1. In the search field, search for Create Security Group.
    2. In the Type of Tenanted Security Group pull-down menu, select Integration System Security Group (Unconstrained).
    3. In the Name field, enter a name. Click OK.
    4. In the Integration System Users field, enter your ISU name. Click OK.
  5. Create your API Client for integrations.

    1. In the search field, search for API Client for Integration.
    2. Enter the client name.
    3. Enable Non-Expiring Refresh Tokens.
    4. In Scope (Functional Areas), select Staffing and Organizations and Roles. Click OK.
    5. Save the client ID and client secret. Click Done.
    tip

    If you didn't save your client secret, use the search field and enter View API client. Go to API clients for Integrations, select the API client, and click the three dots. Click API Client and select Generate New API Client Secret.

  6. In the search bar, search for Maintain Permissions for Security Group.

  7. Select your security group.

  8. Select the following Domain Security Policy and View/Modify Access using the table below (the policies enable the retrieval of information in the queries and mappings). Click OK.

View/Modify AccessDomain Security PolicyFunctional Area
View onlyWorker data: Public Worker ReportsStaffing
View onlyWorker data: Current Staffing InformationStaffing
View onlyWorker data: WorkersStaffing
View onlyWorker data: OrganizationsStaffing
View onlyReports: OrganizationOrganizations and Roles
View onlySet up: OrganizationOrganizations and Roles
View onlyManage: Supervisory OrganizationOrganizations and Roles
View onlyReports: Supervisory Organization View as of DateOrganizations and Roles
  1. In the search bar, search for Activate Pending Security Policy Changes. Enter a comment and click OK.
  2. Select the checkbox for the Confirm option. Click OK.