ConfigBot WD - Impact Analysis Security (Domain Security Difference)
Impact Analysis Security - Domain Security Difference
The following article explains how to generate Impact Analysis Security for Domain Security Differences in Workday using ConfigBot.
- Enter your Username and Password and click on the submit button to login.

- Navigate towards the "Home screen" and click on the " Impact Analysis" and then Click on Impact Analysis Security Module.

- Select the workspace that best suits your preferences or requirements.

- Navigate to the generated workbook (in my case, Iteration #1) and open the workbook.

- Within the workbook, you can navigate to "Domain Security Difference" Sheet and verify that it is empty.

- To generate the analysis, navigate back to your workspace, open the hamburger menu, and select the ‘Generate Analysis’ option. In the Generate Analysis window, choose the ‘Domain Security Difference’ option and select the source iteration from which data would be fetch and then specify destination 1 and 2 for analyzing differences . Once the selections are complete, click the ‘Confirm and Start’ button to initiate the analysis process.


- You can track the progress of iteration by clicking on Information Icon (i).

- Once the execution is completed, open the workbook and navigate to the relevant sheet. Review the highlighted data: red highlights with "Yes" indicate that the permissions differ between the source and destination, while green highlights with "No" indicate that the permissions are consistent across both.


In conclusion, ConfigBot’s analysis functionality provides clear visibility into data similarities and differences between source and destination iterations. Where we can analyze that which security group have similar and different domain permissions across iterations from different instances. By generating and reviewing this analysis, users can clearly identify similarities and differences in data between source and destination iterations before implementation. This structured approach enables better validation of permission alignment, helps minimize risks associated with inconsistencies, and supports more informed, data-driven decision-making.
Updated on: 04/23/2026
Thank you!