{"id":3518,"date":"2023-04-12T15:37:04","date_gmt":"2023-04-12T15:37:04","guid":{"rendered":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/"},"modified":"2026-01-22T17:46:42","modified_gmt":"2026-01-22T17:46:42","slug":"securing-by-access-rules-workday-adaptive-planning","status":"publish","type":"post","link":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/","title":{"rendered":"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning?"},"content":{"rendered":"<p>Prior to the 2019.3 release, security was restricted to level access control in conjuncture with account, version, and sheet settings .\u00a0 Limited no longer!\u00a0 Security is more robust and now includes access rules on accounts and custom dimensions in order to limit specific intersections of data that users and groups can view or edit.\u00a0 Levels, accounts, and up to three custom dimensions can be secured.<\/p>\n<p>One must submit a support ticket and fill out the proper form to turn on access rules.\u00a0 Once access rules are enabled in an instance, a new option titled \u201cAccess Rules\u201d in the Users and Roles section of the Administration page will be available.<\/p>\n<p>Regardless of the Owned Levels that are assigned in the \u201cUsers\u201d section of Administration, once Access Rules are turned on, if a user is not included in the Access Rules, whether it be as an individual user or part of a group, that person will not have access to view any data. \u00a0(one-time setup when you first turn on access rules).<\/p>\n<p><strong>Creating Access Rules<\/strong><\/p>\n<p>The first step in applying access rules is selecting\/adding the dimensions you want to secure. \u00a0This can include Levels, Accounts and custom Dimensions, with a few <strong><em>exceptions<\/em><\/strong>.<\/p>\n<p><strong><em>\u00a0<\/em><\/strong><strong><em>Exceptions include:<\/em><\/strong><\/p>\n<ul>\n<li>There are already three secured custom dimensions<\/li>\n<li>\u201cUse on Level\u201d or \u201cData import automatically creates dimension values\u201d dimension settings are enabled<\/li>\n<li>Modeled or Cube sheets that contain the dimension has the setting enabled to \u201cEdit dimension on sheet\u201d<\/li>\n<li>The dimension has more than 10,000 values<\/li>\n<\/ul>\n<p>The next step is to export the existing access rules or template (can be found by clicking Import), and add\/update rows (access rules) as needed with the appropriate columns filled in.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1122 size-full\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2020\/07\/Securing-Rules.png\" alt=\"\" width=\"1778\" height=\"137\" \/><\/p>\n<p><strong>Access Type \u2013<\/strong> determines how data can be accessed and provides three options:\u00a0 Limited View, Full View, and Edit.\u00a0 Limited View prevents you from seeing supporting details such as splits, modeled sheet rows, and transactions.\u00a0 Full View allows you to see all data details and Edit allows you to view all data and make changes.<\/p>\n<p><strong>Username <\/strong>or <strong>Group Name \u2013 <\/strong>will be the user ID or group name.\u00a0 If multiple users have the same access, add them to a single group and write one access rule.<\/p>\n<p><strong>Level<\/strong> \u2013 is critical for users to access data and can include a mix of parents and children; including a parent level will assume access to all it\u2019s descendants.\u00a0 Can grant or exclude access.<\/p>\n<p><strong>Account <\/strong>or<strong> Custom Dimension <\/strong>columns \u2013 can be left blank (which assumes full access) or can grant or exclude access.<\/p>\n<p>The final step is importing your access rules.\u00a0 You can choose from the options:\u00a0 \u201cUpdate and Append\u201d or \u201cReplace All\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1123\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2020\/07\/Securing-Rules2.png\" alt=\"\" width=\"1540\" height=\"358\" \/><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><span style=\"color: #3366ff;\"><strong>Navigating the Access Rules Table<\/strong><\/span><\/p>\n<p><strong>Type \u2013 <\/strong>refers to either User or Group and will autogenerate.\u00a0 By clicking on \u201cUser\u201d or \u201cGroup\u201d in the Type column you can view the specific rule details.<\/p>\n<p><strong>More Options \u2013 <\/strong>all column headers except Level gives you additional options by hovering over them.\u00a0 Type, Name, and Access provide sorting capabilities and Account and custom dimensions have a Remove option.<\/p>\n<p><strong>Search \u2013 <\/strong>quickly search for keywords to find specific rules<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #3366ff;\"><strong>Rule Precedence<\/strong><\/span><\/p>\n<p>Many times, a user will have multiple access rules.\u00a0 Be aware that access follows the most permissive rule.\u00a0 For example, assume a scenario where a user is part of a group rule that has top level access and that user has an individual rule that limits access to only a couple child Levels.\u00a0 That user will be able to access data at all levels because the group they are part of has top level access.<\/p>\n<p><span style=\"color: #3366ff;\"><strong>Example<\/strong><\/span><\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1124\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2020\/07\/Securing-Rules3.png\" alt=\"\" width=\"838\" height=\"176\" \/><\/strong><\/p>\n<p><em>In the Example above:\u00a0 <\/em><\/p>\n<ul>\n<li>User Test1 has Edit Access to Corporate and All Products<\/li>\n<li>User Test2 has Edit Access to West Region, Bicycles and Skateboards<\/li>\n<li>User Test3 has Full View Access to Southeast Region and All Products EXCEPT Snowplows<\/li>\n<li>All users in the \u201cRead Users\u201d group have Limited View Access to All Levels EXCEPT Corporate and All Products<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Prior to the 2019.3 release, security was restricted to level access control in conjuncture with account, version, and sheet settings .\u00a0 Limited no longer!\u00a0 Security is more robust and now includes access rules on accounts and custom dimensions in order to limit specific intersections of data that users and groups can view or edit.\u00a0 Levels,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[23],"tags":[35,69,54],"class_list":["post-3518","post","type-post","status-publish","format-standard","hentry","category-workday-adaptive-planning","tag-development","tag-workday-adaptive-planning","tag-workday-adaptive-planning-development"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>When Should I Use Access Rules to Secure Data in Workday Adaptive Planning? - QueBIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning? - QueBIT\" \/>\n<meta property=\"og:description\" content=\"Prior to the 2019.3 release, security was restricted to level access control in conjuncture with account, version, and sheet settings .\u00a0 Limited no longer!\u00a0 Security is more robust and now includes access rules on accounts and custom dimensions in order to limit specific intersections of data that users and groups can view or edit.\u00a0 Levels,&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/\" \/>\n<meta property=\"og:site_name\" content=\"QueBIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T15:37:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T17:46:42+00:00\" \/>\n<meta name=\"author\" content=\"agoddard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"agoddard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/\"},\"author\":{\"name\":\"agoddard\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\"},\"headline\":\"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning?\",\"datePublished\":\"2023-04-12T15:37:04+00:00\",\"dateModified\":\"2026-01-22T17:46:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/\"},\"wordCount\":656,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Securing-Rules.png\",\"keywords\":[\"Development\",\"Workday Adaptive Planning\",\"Workday Adaptive Planning Development\"],\"articleSection\":[\"Workday Adaptive Planning\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/\",\"name\":\"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning? - QueBIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Securing-Rules.png\",\"datePublished\":\"2023-04-12T15:37:04+00:00\",\"dateModified\":\"2026-01-22T17:46:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Securing-Rules.png\",\"contentUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Securing-Rules.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/securing-by-access-rules-workday-adaptive-planning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\",\"name\":\"QueBIT\",\"description\":\"QueBIT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\",\"name\":\"agoddard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"caption\":\"agoddard\"},\"sameAs\":[\"https:\\\/\\\/quebit.com\\\/askquebit\"],\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/author\\\/agoddard\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning? - QueBIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/","og_locale":"en_US","og_type":"article","og_title":"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning? - QueBIT","og_description":"Prior to the 2019.3 release, security was restricted to level access control in conjuncture with account, version, and sheet settings .\u00a0 Limited no longer!\u00a0 Security is more robust and now includes access rules on accounts and custom dimensions in order to limit specific intersections of data that users and groups can view or edit.\u00a0 Levels,&hellip;","og_url":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/","og_site_name":"QueBIT","article_published_time":"2023-04-12T15:37:04+00:00","article_modified_time":"2026-01-22T17:46:42+00:00","author":"agoddard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"agoddard","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/#article","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/"},"author":{"name":"agoddard","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084"},"headline":"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning?","datePublished":"2023-04-12T15:37:04+00:00","dateModified":"2026-01-22T17:46:42+00:00","mainEntityOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/"},"wordCount":656,"commentCount":0,"image":{"@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2020\/07\/Securing-Rules.png","keywords":["Development","Workday Adaptive Planning","Workday Adaptive Planning Development"],"articleSection":["Workday Adaptive Planning"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/","url":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/","name":"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning? - QueBIT","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/#primaryimage"},"image":{"@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2020\/07\/Securing-Rules.png","datePublished":"2023-04-12T15:37:04+00:00","dateModified":"2026-01-22T17:46:42+00:00","author":{"@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084"},"breadcrumb":{"@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/#primaryimage","url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2020\/07\/Securing-Rules.png","contentUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2020\/07\/Securing-Rules.png"},{"@type":"BreadcrumbList","@id":"https:\/\/quebit.com\/askquebit\/securing-by-access-rules-workday-adaptive-planning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quebit.com\/askquebit\/"},{"@type":"ListItem","position":2,"name":"When Should I Use Access Rules to Secure Data in Workday Adaptive Planning?"}]},{"@type":"WebSite","@id":"https:\/\/quebit.com\/askquebit\/#website","url":"https:\/\/quebit.com\/askquebit\/","name":"QueBIT","description":"QueBIT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quebit.com\/askquebit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084","name":"agoddard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","caption":"agoddard"},"sameAs":["https:\/\/quebit.com\/askquebit"],"url":"https:\/\/quebit.com\/askquebit\/author\/agoddard\/"}]}},"_links":{"self":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/comments?post=3518"}],"version-history":[{"count":2,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3518\/revisions"}],"predecessor-version":[{"id":5143,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3518\/revisions\/5143"}],"wp:attachment":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/media?parent=3518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/categories?post=3518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/tags?post=3518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}