Workflow Security
Workflow security controls who can see, execute, and certify each Workflow Profile. Security is enforced through named Security Groups assigned at the profile level. These groups work together with the OneStream identity layer (Users, Groups, Roles) to create a layered permission model. A user who is not a member of the relevant group simply cannot perform the action — the UI disables the corresponding buttons and the API rejects the call.
Profile-Level Security Groups
Every Workflow Profile exposes four security group properties. Each one controls a different surface area of interaction with the profile.
| Security Group | Controls | Typical Assignment |
|---|---|---|
| AccessGroup | Who can see the profile and its entities in OnePlace | All users who need visibility into the entity's workflow status |
| MaintenanceGroup | Who can modify the profile's configuration in the Application area | Administrators only |
| WorkflowExecutionGroup | Who can execute workflow tasks (Import, Load, Process) for this profile | Data loaders, power users |
| CertificationSignOffGroup | Who can certify (sign off) on the profile's data | Controllers, managers with sign-off authority |
The most common pair to configure is WorkflowExecutionGroup and CertificationSignOffGroup. AccessGroup defaults to broad visibility, and MaintenanceGroup is typically restricted to the admin team that manages application configuration.
Journal-Specific Groups
When the profile has an Adjustment child type configured, three additional security groups become available. These control the journal entry lifecycle independently from the main workflow tasks.
| Security Group | Controls |
|---|---|
| JournalProcessGroup | Who can create and process journal entries |
| JournalApprovalGroup | Who can approve journal entries (if approval workflow is enabled) |
| JournalPostGroup | Who can post approved journals to the cube |
Security Inheritance
Workflow Profiles form a hierarchy (CubeRoot → Review → BaseInput), and security groups follow that hierarchy with a simple inheritance rule:
- Child profiles inherit security from their parent unless explicitly overridden.
- If a BaseInput profile has no WorkflowExecutionGroup set, it inherits from the CubeRoot or Review profile above it.
- Explicit assignment on a child profile overrides inheritance completely — it does not merge with the parent's group.
- If a parent has WorkflowExecutionGroup = "DataLoaders" and a child sets WorkflowExecutionGroup = "RegionalLoaders", only members of "RegionalLoaders" can execute tasks on the child. Members of "DataLoaders" have no implicit access to the child.
Common Security Patterns
Pattern 1: Separating Loaders from Certifiers
The most fundamental pattern — ensure the people loading data cannot also certify it.
- WorkflowExecutionGroup = "DataLoaders" — the team that imports and processes data
- CertificationSignOffGroup = "Controllers" — a different group that reviews and certifies
- This separation of duties is a core internal control. Auditors expect to see different groups in these two fields.
Pattern 2: Regional Review with Central Certification
For organizations with regional teams that load data but a central finance team that certifies:
- Review profiles for each region with AccessGroup = the regional team
- BaseInput profiles under each Review with WorkflowExecutionGroup = regional data loaders
- CertificationSignOffGroup on Review profiles = "CentralFinance" — only the central team can certify
This gives regional teams full control over data entry while reserving final sign-off for central finance.
Pattern 3: Read-Only Observers
Allow stakeholders to monitor workflow progress without being able to act:
- AccessGroup includes the "Observers" group so they can view status in OnePlace
- WorkflowExecutionGroup and CertificationSignOffGroup exclude them — they can see but not act
Related Content
- Workflow Profile Hierarchy — how profiles are structured from CubeRoot down to BaseInput
- Input Profiles and Child Types — child types including Adjustment that enable journal groups
- Dashboard Architecture — dashboard security groups follow similar patterns