Stitchflow
Workday logo

Workday User Management Guide

Manual workflow

How to add, remove, and manage users with operational caveats that matter in production.

UpdatedMar 17, 2026

Summary and recommendation

Workday user management can be run manually, but complexity usually increases with role models, licensing gates, and offboarding dependencies. This guide gives the exact mechanics and where automation has the biggest impact.

Workday is the system of record for HR data in most enterprise environments, meaning it drives identity and access for every app downstream - not just its own UI.

User accounts are a byproduct of HR business processes: employees are created via the Hire workflow, not a standalone user-creation screen.

Access is controlled through a layered security group model combining role-based, user-based, and intersection groups tied to domain and business process policies.

Quick facts

Admin console pathWorkday Home → Search 'Maintain Workday Accounts' or navigate via Menu → Security Administration
Admin console URLOfficial docs
SCIM availableYes
SCIM tier requiredEnterprise
SSO prerequisiteYes

User types and roles

Role Permissions Cannot do Plan required Seat cost Watch out for
System Administrator (ISU / Integration System User) Full administrative access to tenant configuration, security policy management, business process setup, and integration management. Can create and assign all security groups. Cannot bypass audit logging; all actions are tracked. Cannot self-approve certain business processes if approval chains are configured. ISU accounts are non-human service accounts used for integrations; they require their own security group assignments and should not be used for human administrator access.
HR Administrator / HR Partner Can initiate and complete HR business processes (hire, terminate, change job), manage worker data within their supervisory organization scope, and run HR reports. Cannot modify tenant-level security policies or domain security configurations without additional security group membership. Access is scoped by supervisory organization hierarchy; an HR Partner only sees workers in their assigned organizations unless additional role-based access is granted.
Manager (Self-Service) Can view and take actions on direct reports (approve time off, initiate job changes, view team data) within their supervisory organization. Cannot access workers outside their direct reporting chain. Cannot modify security configurations. Manager access is dynamically assigned based on the supervisory organization structure in Workday, not manually granted per user.
Employee (Self-Service) Can view and update personal information, submit time-off requests, view pay slips, enroll in benefits, and complete assigned tasks. Cannot view other workers' data. Cannot initiate administrative business processes. Employee self-service access is automatically provisioned when a worker record is created via the Hire business process.
Workday-Owned Security Group Member (e.g., Payroll Administrator, Benefits Administrator) Pre-built role with domain and business process security policies scoped to a functional area (payroll, benefits, recruiting, etc.). Workday-owned security groups cannot be modified by tenant administrators; only tenant-created copies can be customized. Workday periodically updates Workday-owned security groups during weekly service updates; tenant admins must review release notes to understand permission changes.

Permission model

  • Model type: hybrid
  • Description: Workday uses a security group model combining role-based access (Role-Based Security Groups tied to positions or job profiles), user-based groups (User-Based Security Groups for named individuals), and intersection security groups (combining role and user membership). Permissions are granted by assigning security groups to Domain Security Policies and Business Process Security Policies. Tenant administrators can create custom security groups and policies.
  • Custom roles: Yes
  • Custom roles plan: Not documented
  • Granularity: Domain-level (controls access to data domains such as 'Worker Data: Personal Information') and Business Process step-level (controls who can initiate, approve, or view each step of a business process). Segmented Security Groups can further restrict access to subsets of workers (e.g., by location or pay group).

How to add users

  1. To create a worker-linked account: Initiate the 'Hire' business process via Search > 'Hire Employee' or 'Hire Contingent Worker'. Complete all required staffing and personal data fields. Upon completion, Workday automatically creates a Workday account for the worker.
  2. To create a standalone (non-worker) account: Search for 'Create Workday Account' task. Enter the account name, password settings, and assign applicable security groups.
  3. Assign the user to the appropriate security groups: Search 'Maintain User-Based Security Group' or edit the relevant Role-Based Security Group to include the new worker's position.
  4. Activate the account if it was created in an inactive state: Search 'Maintain Workday Accounts', locate the user, and set account status to Active.
  5. Notify the user of their login credentials or configure SSO so they authenticate via the identity provider.

Required fields: Legal first and last name, Hire date, Worker type (Employee or Contingent Worker), Position or job profile, Supervisory organization, Primary work location, Account username (for standalone accounts)

Watch out for:

  • Worker accounts are created as a byproduct of the Hire business process; there is no standalone 'create user' button for employees - the HR record must exist first.
  • The Hire business process may require multiple approvals before the account is active, depending on tenant configuration.
  • Security group membership for role-based groups is driven by the worker's position/job profile, not manually assigned per user - changing access requires changing the position or the security group policy.
  • SSO configuration must be completed at the tenant level before users can authenticate via an identity provider; individual user SSO cannot be toggled independently.
  • Workday usernames must be unique across the tenant and cannot be reused after a worker is terminated.
Bulk option Availability Notes
CSV import Yes Workday supports bulk hire via EIB (Enterprise Interface Builder): Search 'Load Data' or 'Create EIB' > select 'Worker' template > upload spreadsheet. Also available via PECI/PICOF integration for payroll providers.
Domain whitelisting No Automatic domain-based user add
IdP provisioning Yes Enterprise (requires SSO configuration; Workday supports inbound provisioning via SCIM for Strategic Sourcing module; for core HCM, Workday typically acts as the authoritative source pushing to downstream apps rather than receiving provisioning from an IdP)

How to remove or deactivate users

  • Can delete users: No
  • Delete/deactivate behavior: Workday does not delete worker records or Workday accounts. Terminating a worker via the 'Terminate Employee' business process deactivates their Workday account and removes active security group memberships, but the worker record and all associated historical data are retained permanently for audit and reporting purposes. Standalone (non-worker) accounts can be deactivated via 'Maintain Workday Accounts' but are not deleted.
  1. To terminate a worker: Search 'Terminate Employee' (or 'End Contingent Worker Contract'). Select the worker.
  2. Enter the termination date, reason code, and any required details (e.g., regrettable/non-regrettable, eligible for rehire).
  3. Complete any required approval steps in the Terminate business process chain.
  4. Upon business process completion, Workday automatically deactivates the worker's Workday account on the termination date.
  5. To immediately deactivate a standalone account: Search 'Maintain Workday Accounts', locate the account, edit and set status to 'Inactive'.
Data impact Behavior
Owned records All worker data, transactions, and history are retained indefinitely in the Workday tenant after termination. The worker record moves to 'Terminated' status but remains fully accessible to authorized administrators.
Shared content Reports, dashboards, and custom objects created by the terminated worker remain in the system. Ownership transfer is not an automatic process; administrators must manually reassign or archive as needed.
Integrations Active integrations (e.g., payroll, benefits) that reference the worker will receive termination event data on the next integration run. ISU/service account deactivation must be handled separately and will break any integrations using that account.
License freed Workday pricing is based on total employee headcount under contract, not concurrent active users. Terminating a worker does not automatically reduce the contracted seat count; license adjustments are handled at contract renewal or via a formal amendment with Workday.

Watch out for:

  • The termination date in Workday controls when the account is deactivated; if a future date is entered, the worker retains access until that date.
  • Terminated workers can be rehired; their historical record is preserved and linked to the new hire event.
  • Deactivating an ISU (Integration System User) account will immediately break all integrations using that account's credentials - coordinate with integration owners before deactivating.
  • Security group memberships tied to the worker's position are removed upon termination, but any manually added User-Based Security Group memberships may need to be removed separately depending on tenant configuration.
  • Workday does not send automatic notifications to the terminated worker or their manager when account access is revoked - this must be handled via a separate offboarding process.

License and seat management

Seat type Includes Cost
Full Platform User (HCM, Financials, etc.) Access to all licensed Workday modules for that worker (HCM, Payroll, Financials, Planning, etc.) based on contracted modules. Custom enterprise pricing; typically quoted as a per-employee-per-year rate ($100–$200/employee/year range based on market data, subject to contract).
Limited User / Self-Service User Employee and manager self-service capabilities only (personal data, time off, benefits, pay). No administrative or configuration access. Typically included in the per-employee headcount pricing; not separately itemized in most contracts.
  • Where to check usage: Search 'Workday Account Usage' report or navigate to Security Administration > Workday Accounts to view active account counts and last login data. Tenant administrators can also run the 'All Workday Accounts' report.
  • How to identify unused seats: Run the 'Workday Account Usage' or 'User Activity' audit report filtered by last login date to identify accounts with no recent activity. Workday does not have a built-in automated unused-seat alert; this requires manual report review or a custom scheduled report.
  • Billing notes: Workday licenses are sold on an annual subscription basis with pricing based on total employee headcount at contract signing, not active users. Module-based pricing means each functional area (HCM, Payroll, Financials, Recruiting, etc.) is licensed separately. Headcount-based pricing means terminated workers do not reduce the current contract cost; adjustments occur at renewal. All pricing requires a direct quote from Workday sales.

The cost of manual management

Workday licenses are priced on total employee headcount at contract signing, not active users. That means terminated employees do not reduce your current contract cost - adjustments happen only at renewal. Each functional module (HCM, Payroll, Financials, Recruiting) is licensed separately, so your actual spend depends on which modules are active across your org.

What IT admins are saying

Community evidence is not specific enough to quote or summarize yet for this app.

The decision

Workday is the right choice as an HR source of truth when you need a single authoritative record that propagates identity changes to every app in your stack. The business process model enforces approval chains and audit trails by design, which is an advantage in regulated environments.

The tradeoff is operational overhead. Ad-hoc access grants are difficult because role-based security is tied to position and job profile structures, not individual users. If your team lacks dedicated Workday security expertise, plan for a meaningful ramp-up period before the permission model is under confident control.

Bottom line

Workday's value as an identity source scales with how consistently it is kept current - stale org structures or delayed terminations create access gaps across every app that depends on it.

The security group model is powerful but unforgiving: misconfigured domain policies or overlooked User-Based Security Group memberships after termination are the most common sources of over-provisioned access.

Organizations that invest in clean supervisory org hierarchies and scheduled account-usage report reviews get the most reliable access hygiene from the platform.

Automate Workday workflows without one-off scripts

Stitchflow builds and maintains end-to-end IT automation across your SaaS stack, including apps without APIs. Built for exactly how your company works, with human approvals where they matter.

Every app coverage, including apps without APIs
60+ app integrations plus browser automation for apps without APIs
IT graph reconciliation across apps and your IdP
Less than a week to launch, maintained as APIs and admin consoles change
SOC 2 Type II. ~2 hours of your team's time

UpdatedMar 17, 2026

* Details sourced from official product documentation and admin references.

Keep exploring

Related apps

15Five logo

15Five

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

15Five uses a fixed role-based permission model with six predefined roles: Account Admin, HR Admin, Billing Admin, Group Admin, Manager, and Employee. No custom roles can be constructed. User management lives at Settings gear → People → Manage people p

1Password logo

1Password

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

1Password's admin console at my.1password.com covers the full user lifecycle — invitations, group assignments, vault access, suspension, and deletion — without any third-party tooling. Like every app that mixes role-based and resource-level permissions

8x8 logo

8x8

Full API + SCIM
AutomationAPI + SCIM
Last updatedFeb 2026

8x8 Admin Console supports full lifecycle user management — create, deactivate, and delete — across its X Series unified communications platform. Every app a user can access (8x8 Work desktop, mobile, web, Agent Workspace) is gated by license assignmen