Submit Search
Upload
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
•
1 like
•
253 views
p6academy
Follow
For more slides and tutorials visit www.p6academy.com Source: Collaborate 14
Read less
Read more
Business
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Ch1-Software Engineering 9
Ch1-Software Engineering 9
Ian Sommerville
Mvc architecture driven design and agile implementation of a web based softwa...
Mvc architecture driven design and agile implementation of a web based softwa...
ijseajournal
Engineering Software Products: 6. microservices architecture
Engineering Software Products: 6. microservices architecture
software-engineering-book
Ch6 architectural design
Ch6 architectural design
software-engineering-book
Requirements management and IBM Rational Jazz solutions
Requirements management and IBM Rational Jazz solutions
IBM Rational software
Ch19-Software Engineering 9
Ch19-Software Engineering 9
Ian Sommerville
Ch19 systems engineering
Ch19 systems engineering
software-engineering-book
Ch2 - SW Processes
Ch2 - SW Processes
Harsh Verdhan Raj
Recommended
Ch1-Software Engineering 9
Ch1-Software Engineering 9
Ian Sommerville
Mvc architecture driven design and agile implementation of a web based softwa...
Mvc architecture driven design and agile implementation of a web based softwa...
ijseajournal
Engineering Software Products: 6. microservices architecture
Engineering Software Products: 6. microservices architecture
software-engineering-book
Ch6 architectural design
Ch6 architectural design
software-engineering-book
Requirements management and IBM Rational Jazz solutions
Requirements management and IBM Rational Jazz solutions
IBM Rational software
Ch19-Software Engineering 9
Ch19-Software Engineering 9
Ian Sommerville
Ch19 systems engineering
Ch19 systems engineering
software-engineering-book
Ch2 - SW Processes
Ch2 - SW Processes
Harsh Verdhan Raj
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
kalimullahmohd89
Ch17-Software Engineering 9
Ch17-Software Engineering 9
Ian Sommerville
term paper for cbd models
term paper for cbd models
Sukhdeep Singh
Ch25 configuration management
Ch25 configuration management
software-engineering-book
Define and Manage Requirements with IBM Rational Requirements Composer
Define and Manage Requirements with IBM Rational Requirements Composer
Alan Kan
Ch7 implementation
Ch7 implementation
software-engineering-book
Oracle Open World S308250 Securing Your People Soft Application Via Idm
Oracle Open World S308250 Securing Your People Soft Application Via Idm
edwinlorenzana
ASSIGNMENT
ASSIGNMENT
خالد الرشيدي
Rapid Deployment of BMC Remedy Solutions 2006
Rapid Deployment of BMC Remedy Solutions 2006
Antonio Rolle
Ijcet 06 07_005
Ijcet 06 07_005
IAEME Publication
Ch18 service oriented software engineering
Ch18 service oriented software engineering
software-engineering-book
Unit2 Software engineering UPTU
Unit2 Software engineering UPTU
Mohammad Faizan
Ch8.testing
Ch8.testing
software-engineering-book
Ch15 software reuse
Ch15 software reuse
software-engineering-book
Ch16 component based software engineering
Ch16 component based software engineering
software-engineering-book
Ch17 distributed software engineering
Ch17 distributed software engineering
software-engineering-book
Shine inner beauty3
Shine inner beauty3
Senasprod Woomen
EPC Brief
EPC Brief
LY97
TRINITY-1024-A-1-C
TRINITY-1024-A-1-C
Cathy Faulkner
DOC073015-07302015131625
DOC073015-07302015131625
Joshua Filzer
Resume
Resume
Ryan Kilian
Protractor
Protractor
Sthanley Carlos De Lima Junior
More Related Content
What's hot
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
kalimullahmohd89
Ch17-Software Engineering 9
Ch17-Software Engineering 9
Ian Sommerville
term paper for cbd models
term paper for cbd models
Sukhdeep Singh
Ch25 configuration management
Ch25 configuration management
software-engineering-book
Define and Manage Requirements with IBM Rational Requirements Composer
Define and Manage Requirements with IBM Rational Requirements Composer
Alan Kan
Ch7 implementation
Ch7 implementation
software-engineering-book
Oracle Open World S308250 Securing Your People Soft Application Via Idm
Oracle Open World S308250 Securing Your People Soft Application Via Idm
edwinlorenzana
ASSIGNMENT
ASSIGNMENT
خالد الرشيدي
Rapid Deployment of BMC Remedy Solutions 2006
Rapid Deployment of BMC Remedy Solutions 2006
Antonio Rolle
Ijcet 06 07_005
Ijcet 06 07_005
IAEME Publication
Ch18 service oriented software engineering
Ch18 service oriented software engineering
software-engineering-book
Unit2 Software engineering UPTU
Unit2 Software engineering UPTU
Mohammad Faizan
Ch8.testing
Ch8.testing
software-engineering-book
Ch15 software reuse
Ch15 software reuse
software-engineering-book
Ch16 component based software engineering
Ch16 component based software engineering
software-engineering-book
Ch17 distributed software engineering
Ch17 distributed software engineering
software-engineering-book
What's hot
(16)
National%20 online%20examination%20system%20an%20architectural%20perspective
National%20 online%20examination%20system%20an%20architectural%20perspective
Ch17-Software Engineering 9
Ch17-Software Engineering 9
term paper for cbd models
term paper for cbd models
Ch25 configuration management
Ch25 configuration management
Define and Manage Requirements with IBM Rational Requirements Composer
Define and Manage Requirements with IBM Rational Requirements Composer
Ch7 implementation
Ch7 implementation
Oracle Open World S308250 Securing Your People Soft Application Via Idm
Oracle Open World S308250 Securing Your People Soft Application Via Idm
ASSIGNMENT
ASSIGNMENT
Rapid Deployment of BMC Remedy Solutions 2006
Rapid Deployment of BMC Remedy Solutions 2006
Ijcet 06 07_005
Ijcet 06 07_005
Ch18 service oriented software engineering
Ch18 service oriented software engineering
Unit2 Software engineering UPTU
Unit2 Software engineering UPTU
Ch8.testing
Ch8.testing
Ch15 software reuse
Ch15 software reuse
Ch16 component based software engineering
Ch16 component based software engineering
Ch17 distributed software engineering
Ch17 distributed software engineering
Viewers also liked
Shine inner beauty3
Shine inner beauty3
Senasprod Woomen
EPC Brief
EPC Brief
LY97
TRINITY-1024-A-1-C
TRINITY-1024-A-1-C
Cathy Faulkner
DOC073015-07302015131625
DOC073015-07302015131625
Joshua Filzer
Resume
Resume
Ryan Kilian
Protractor
Protractor
Sthanley Carlos De Lima Junior
trabajo 3
trabajo 3
yajaira alexandra
P6 analytics producing meaningful results in p6 analytics - Oracle Primavera...
P6 analytics producing meaningful results in p6 analytics - Oracle Primavera...
p6academy
AEO Safety and Security Guidelines: Custom Agent | Prep4Audit
AEO Safety and Security Guidelines: Custom Agent | Prep4Audit
Prep4Audit
SharePoint Content Database Sizing-BLOB-Crawl
SharePoint Content Database Sizing-BLOB-Crawl
E Blake
P6 eppm strengthening the capacity of the leading national cancer center in t...
P6 eppm strengthening the capacity of the leading national cancer center in t...
p6academy
Guidelines for online success
Guidelines for online success
Calvin Nguyen
Oracle Primavera P6 r8.2 and cm14 on exa platform using oracle fusion middlew...
Oracle Primavera P6 r8.2 and cm14 on exa platform using oracle fusion middlew...
p6academy
PENGENDALIAN INTERNAL DALAM AL-QUR'AN
PENGENDALIAN INTERNAL DALAM AL-QUR'AN
Biyah Djauhar
Untitleddocument(1)
Untitleddocument(1)
18luanamatos
P6 Analytics history hierarchies and maps - Oracle Primavera P6 Collaborate 14
P6 Analytics history hierarchies and maps - Oracle Primavera P6 Collaborate 14
p6academy
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
p6academy
Multi sites construction management and supervision - Oracle Primavera P6 Co...
Multi sites construction management and supervision - Oracle Primavera P6 Co...
p6academy
Viewers also liked
(18)
Shine inner beauty3
Shine inner beauty3
EPC Brief
EPC Brief
TRINITY-1024-A-1-C
TRINITY-1024-A-1-C
DOC073015-07302015131625
DOC073015-07302015131625
Resume
Resume
Protractor
Protractor
trabajo 3
trabajo 3
P6 analytics producing meaningful results in p6 analytics - Oracle Primavera...
P6 analytics producing meaningful results in p6 analytics - Oracle Primavera...
AEO Safety and Security Guidelines: Custom Agent | Prep4Audit
AEO Safety and Security Guidelines: Custom Agent | Prep4Audit
SharePoint Content Database Sizing-BLOB-Crawl
SharePoint Content Database Sizing-BLOB-Crawl
P6 eppm strengthening the capacity of the leading national cancer center in t...
P6 eppm strengthening the capacity of the leading national cancer center in t...
Guidelines for online success
Guidelines for online success
Oracle Primavera P6 r8.2 and cm14 on exa platform using oracle fusion middlew...
Oracle Primavera P6 r8.2 and cm14 on exa platform using oracle fusion middlew...
PENGENDALIAN INTERNAL DALAM AL-QUR'AN
PENGENDALIAN INTERNAL DALAM AL-QUR'AN
Untitleddocument(1)
Untitleddocument(1)
P6 Analytics history hierarchies and maps - Oracle Primavera P6 Collaborate 14
P6 Analytics history hierarchies and maps - Oracle Primavera P6 Collaborate 14
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
Multi sites construction management and supervision - Oracle Primavera P6 Co...
Multi sites construction management and supervision - Oracle Primavera P6 Co...
Similar to Multi project security exception reports - Oracle Primavera P6 Collaborate 14
Dms Project
Dms Project
Kai Liu
Design Documents (4)
Design Documents (4)
Isidro Garcia
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
Hitesh Jangid
J017325660
J017325660
IOSR Journals
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
iosrjce
College information management system.doc
College information management system.doc
Kamal Acharya
System Development Life Cycle part3
System Development Life Cycle part3
DrMohammed Qassim
3 Approaches to Integrated ALM, A case for ALM Platform
3 Approaches to Integrated ALM, A case for ALM Platform
Kovair
Brilient login system
Brilient login system
vasanthvellore
Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02
Shuchi Singla
Onlineshoppingonline shopping
Onlineshoppingonline shopping
Hardik Padhy
SE-Lecture-4.pptx
SE-Lecture-4.pptx
vishal choudhary
Software engineering introduction
Software engineering introduction
Vishal Singh
373512722-Employee-Leave-Management-System.docx
373512722-Employee-Leave-Management-System.docx
santhoshyadav23
Work of art practices in software development.
Work of art practices in software development.
Communication Progress
Elementary Probability theory Chapter 2.pptx
Elementary Probability theory Chapter 2.pptx
ethiouniverse
End User Computing
End User Computing
Ram Dutt Shukla
Print report
Print report
Ved Prakash
MIT520 software architecture assignments (2012) - 1
MIT520 software architecture assignments (2012) - 1
Yudep Apoi
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
Similar to Multi project security exception reports - Oracle Primavera P6 Collaborate 14
(20)
Dms Project
Dms Project
Design Documents (4)
Design Documents (4)
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
J017325660
J017325660
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
College information management system.doc
College information management system.doc
System Development Life Cycle part3
System Development Life Cycle part3
3 Approaches to Integrated ALM, A case for ALM Platform
3 Approaches to Integrated ALM, A case for ALM Platform
Brilient login system
Brilient login system
Onlineshopping 121105040955-phpapp02
Onlineshopping 121105040955-phpapp02
Onlineshoppingonline shopping
Onlineshoppingonline shopping
SE-Lecture-4.pptx
SE-Lecture-4.pptx
Software engineering introduction
Software engineering introduction
373512722-Employee-Leave-Management-System.docx
373512722-Employee-Leave-Management-System.docx
Work of art practices in software development.
Work of art practices in software development.
Elementary Probability theory Chapter 2.pptx
Elementary Probability theory Chapter 2.pptx
End User Computing
End User Computing
Print report
Print report
MIT520 software architecture assignments (2012) - 1
MIT520 software architecture assignments (2012) - 1
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
More from p6academy
Oracle OpenWorld 2015
Oracle OpenWorld 2015
p6academy
Plan and Execute the Right Projects— Easily and Affordably
Plan and Execute the Right Projects— Easily and Affordably
p6academy
What's New In Primavera P6 EPPM 17.1
What's New In Primavera P6 EPPM 17.1
p6academy
Oracle Primavera Unifier What's New in Release 16.2
Oracle Primavera Unifier What's New in Release 16.2
p6academy
Oracle What's New In Primavera P6 16.2
Oracle What's New In Primavera P6 16.2
p6academy
What's New in Primavera Prime 16.1
What's New in Primavera Prime 16.1
p6academy
What's New in Primavera Gateway 16.1
What's New in Primavera Gateway 16.1
p6academy
What's New In Primavera Analytics 16.1
What's New In Primavera Analytics 16.1
p6academy
What's New in Unifier 16.1
What's New in Unifier 16.1
p6academy
20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop
p6academy
Oracle Primavera P6 16.1 Announced
Oracle Primavera P6 16.1 Announced
p6academy
Oracle Primavera Unifier 16.1
Oracle Primavera Unifier 16.1
p6academy
P6 Release 8 Application Considerations Overview
P6 Release 8 Application Considerations Overview
p6academy
Administering Users, Access and Views in P6 EPPM (Web) Release 8 and later
Administering Users, Access and Views in P6 EPPM (Web) Release 8 and later
p6academy
P6 Release 8 Installation Orientation
P6 Release 8 Installation Orientation
p6academy
Oracle Primavera P6 R8 Release Value Proposition
Oracle Primavera P6 R8 Release Value Proposition
p6academy
Oracle Primavera P6 v7 Release Value Proposition
Oracle Primavera P6 v7 Release Value Proposition
p6academy
Oracle Primavera P6 Release Content Document (RCD)
Oracle Primavera P6 Release Content Document (RCD)
p6academy
Oracle Support Accreditation – Level 1 Study Guide
Oracle Support Accreditation – Level 1 Study Guide
p6academy
Oracle Primavera Support Accreditation Study Guide
Oracle Primavera Support Accreditation Study Guide
p6academy
More from p6academy
(20)
Oracle OpenWorld 2015
Oracle OpenWorld 2015
Plan and Execute the Right Projects— Easily and Affordably
Plan and Execute the Right Projects— Easily and Affordably
What's New In Primavera P6 EPPM 17.1
What's New In Primavera P6 EPPM 17.1
Oracle Primavera Unifier What's New in Release 16.2
Oracle Primavera Unifier What's New in Release 16.2
Oracle What's New In Primavera P6 16.2
Oracle What's New In Primavera P6 16.2
What's New in Primavera Prime 16.1
What's New in Primavera Prime 16.1
What's New in Primavera Gateway 16.1
What's New in Primavera Gateway 16.1
What's New In Primavera Analytics 16.1
What's New In Primavera Analytics 16.1
What's New in Unifier 16.1
What's New in Unifier 16.1
20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop
Oracle Primavera P6 16.1 Announced
Oracle Primavera P6 16.1 Announced
Oracle Primavera Unifier 16.1
Oracle Primavera Unifier 16.1
P6 Release 8 Application Considerations Overview
P6 Release 8 Application Considerations Overview
Administering Users, Access and Views in P6 EPPM (Web) Release 8 and later
Administering Users, Access and Views in P6 EPPM (Web) Release 8 and later
P6 Release 8 Installation Orientation
P6 Release 8 Installation Orientation
Oracle Primavera P6 R8 Release Value Proposition
Oracle Primavera P6 R8 Release Value Proposition
Oracle Primavera P6 v7 Release Value Proposition
Oracle Primavera P6 v7 Release Value Proposition
Oracle Primavera P6 Release Content Document (RCD)
Oracle Primavera P6 Release Content Document (RCD)
Oracle Support Accreditation – Level 1 Study Guide
Oracle Support Accreditation – Level 1 Study Guide
Oracle Primavera Support Accreditation Study Guide
Oracle Primavera Support Accreditation Study Guide
Recently uploaded
Annual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
KeppelCorporation
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
lizamodels9
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
dollysharma2066
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
ashishs7044
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Ayesha Khan
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
ictsugar
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
ictsugar
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
lizamodels9
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
noida100girls
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
callgirls2057
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
Mintel Group
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
KeppelCorporation
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
Data Analytics Company - 47Billion Inc.
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
KaiNexus
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
noida100girls
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
Ariel592675
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
Mintel Group
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
Jos Voskuil
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
nakalysalcedo61
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
Riya Pathan
Recently uploaded
(20)
Annual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
1.
COLLABORATE 14 Copyright
©2014 by Monks Project Solutions Page 1 Multi-Project Security Exception Reports Will Keep Your Users Happy and Your Data Safe Robert C. Monks Monks Project Solutions Abstract: Managing project security permissions in Primavera Contract Management (PCM) can be a daunting task, and the software doesn't make it any easier. This presentation shows how custom reports can be used to audit user security, if you administer a PCM solution. Solutions will be demonstrated using both InfoMaker and BI Publisher making the content valuable to a wide audience of PCM administrators. Participants will be offered the opportunity to receive the reports demonstrated. Security in Primavera Contract Management Security in PCM is implemented through three interrelated features: access templates, user settings and project assignments. This paper concentrates on managing project specific security settings, rather than global security. Access templates contain permissions for modules. Access to each PCM module is controlled. Access rights include View, Add, Edit, Export and Delete. Each right is managed individually for each module. In addition, process permissions are included in access templates. The abilities to Reject/Close Change Management or Update Submittals from Schedule are examples of process permissions. Finally, access templates control whether a user can approve various PCM documents such as contracts, purchase orders and daily reports. Additionally, a monetary limit can be set for approval authority on contracts, purchase orders, change orders and requisitions. Best practice dictates that access templates be defined by role and are thoughtfully constructed to restrict access based on the defined responsibilities of each role involved with a project. If the PCM system is accessed by both internal and external (non-employee) users, we recommend clearly differentiating access templates designed for internal use from those designed for external use. This will simplify the process of auditing project permissions over the life of the project. An example of this would be to prepend “Int-“ or “Ext-“ to each access template name to differentiate templates designated for internal versus external users. Every person accessing PCM must be assigned an individual user account. Each user account requires a company abbreviation and initials tying the login name back to the company and contact information. Coordinating this information between the information entered through the PCM Administration module and the Projects module is critical for controlling project access for external users. It’s also required to properly manage alerts, inbox and approval notifications, if any projects use the approval process in PCM. Each user account also contains non-project level (user level) access privileges governing such items as workspace customization and whether or not they can define cost codes, or custom fields, spec sections, etc. These privileges are not the focus of this paper. Every user account must be assigned at least one access template; however users may be assigned multiple access templates. This would often be the case if an individual plays different roles on different
2.
COLLABORATE 14 Copyright
©2014 by Monks Project Solutions Page 2 projects to which they are assigned. Or if everyone is granted limited access to a “Group Companies” project or company standards projects. Finally, users are assigned to projects using one of their assigned access templates. This is done through the PCM Administration module. Projects are the third feature implementing security in PCM. Clearly, there is some overlap between each of these, but what’s unique about PCM projects is that they have a project administrator assigned. Initially, this is the user who added the project, but it can be reassigned by a PCM administrator (someone who has all rights to all projects). The project administrator has the ability to administer project access (both module and process) only within projects they create or are assigned to. They can also change their own access rights and copy access rights from any project to projects they create or to which they are assigned. The important takeaway from this is that a project administrator can change a user’s access rights within a project such that it is no longer aligned with the access template from which it was assigned. This can only be accomplished from the project access pop-up dialog within the PCM application module, not the PCM administration module. The final interesting bit of functionality, associated with projects, is the ability to further restrict a user’s project access by company abbreviation. This effectively reduces any module access to only those documents either to or from the company the user works for. This feature is especially useful for limiting access to external users. A use case for this would be that I want all of my subcontractors to be able to access the RFI module and create RFIs to me, but I don’t want them to be able to see RFIs created by other subcontractors, or RFIs from me to the owner, unless I specifically reference them in the RFI. PCM’s project security model contains a number of potential exposure risks. First, an administrator could inadvertently assign the wrong access template to a project for a particular user. This is most likely to occur when users have multiple access templates associated with their user account. When assigning a new project to a user from the PCM Administration module, the default template is chosen by default and the administrator must select the correct one, if it’s not desired. Therefore, a best practice would be to ensure that the default template has limited or no access to modules by default. More relevant to this paper is the potential that the access rights have been modified after the access template has been assigned to a user for a project. This is easy to do, but difficult to detect. A simple example will illustrate the point. Let’s assume that company policy exists that no documents may be deleted from the PCM database to ensure data integrity and continuity. An exception might be that if a document was created totally in error, an administrator may delete it immediately after creation. It’s not hard to envision a case where a user requests that a project administrator delete a document for a user, but the project administrator is too busy to accommodate, so he or she temporarily grants delete rights to the module for the user, just so the user can delete the erroneous document and get on with his or her job. Unless the project administrator remembers to remove this right immediately after the document has been deleted, the possibility exists that this user may have permanent delete rights to this module. All this would be in violation of company policy, but difficult to notice without a security audit. An equally undesirable exposure results from the failure to assign a company restriction after assigning project rights to a user via the PCM Administration module. This is easy to forget, as one has to log out of the Administration module and log in to the Project module. It’s less than an elegant process under the best of circumstances. Failure to assign a company restriction effectively allows the user to see all documents, regardless of whether their company is a to-party or from-party in the document. Perhaps a less likely, but equally undesirable result would occur if the company abbreviation didn’t match the company restriction in a project. This potentially could result in an employee of ABC Plumbing seeing
3.
COLLABORATE 14 Copyright
©2014 by Monks Project Solutions Page 3 all of the change orders for XYZ Electric. This might result from copying an existing user account when creating a new user account and forgetting to change the company abbreviation in the copied record. Finally, it’s a potentially significant security risk that a project administrator might just ignore company security policy and assign additional rights to users beyond the assigned template. So, what is required to effectively manage project security in PCM? Administrators need to know what users are assigned to what projects and what access templates users are assigned for each project. They also need to know what privileges each access template grants each user. And finally, administrators need an easy way to determine when a user’s access in a project differs from the access granted to him by the access template. Security Exception Reports PCM ships with two standard security reports: Details Security Report (r_sec_login_group_report_01) and Security Access Report (r_sec_access_report_01). The Details Security Report is accessed from the PCM Administration module. It reports on all projects assigned to a user. It does not show the access template assigned and shows nothing about the access granted to the project. The Security Access Report is accessed from the PCM Projects module. It reports on all rights granted to each user on a project. It prints one page per user per project. It is a single project report; therefore, it must be run for each project. Unfortunately, it provides no easy way to compare project rights versus access template rights. Revised Details Security Report The Details Security Report would be more useful if it reported on the access template assigned to each project. This modification is easily accomplished by adding the security and user_projects tables to the report’s data model. The group_name field from the security table contains the name of the template assigned to the project. The PCM 14.0 MSSQL Server SQL select statement for the original data model is shown below: SELECT LOGIN_NAME, SECURITY_VIEW.GROUP_NAME, SECURITY_VIEW.PROJECT_NAME, GROUP_PROJECTS.PROJECT_TITLE FROM SECURITY_VIEW, GROUP_PROJECTS WHERE SECURITY_VIEW.USER_NAME = :USER_NAME AND GROUP_PROJECTS.project_name = SECURITY_VIEW.PROJECT_NAME ORDER BY LOGIN_NAME
4.
COLLABORATE 14 Copyright
©2014 by Monks Project Solutions Page 4 The SQL select statement for the revised data model is shown below: SELECT V.LOGIN_NAME, V.GROUP_NAME, V.PROJECT_NAME, G.PROJECT_TITLE, s.group_name AS template_name FROM SECURITY_VIEW as V, GROUP_PROJECTS as G, SECURITY as s, USER_PROJECTS as u WHERE V.USER_NAME = ‘:USER_NAME AND G.project_name = V.PROJECT_NAME AND G.group_name = V.group_name AND u.group_project_key = v.group_name + '_' + v.project_name AND u.user_name = v.user_name AND u.template_key = s.master_key ORDER BY V.LOGIN_NAME In the revised SQL select statement, the security and user_projects tables have been added and joined via the where clause; and the group_name field aliased as template_name added to the data set returned. This allows the report to be easily modified to include this information; thus, making the report much more useful for managing user access. New Security Access Report We also created a new report to display the rights granted by each of the access templates. This report was copied from the existing Security Access report, with very minor formatting changes, so it wasn’t a lot of work. We changed the WHERE clause of the SELECT statement so that it pulled template rows, rather than project assignment rows. Template rows are actually stored in the same table, but the template rows have a 1 in the is_template field, whereas the project assignment rows have a zero. The biggest effort revolved around changing the SQL data model to pull from the security table, rather than the security_view. I discovered this change in behavior from 13.1 to 14.0 while preparing for this presentation; therefore, this is a change specific to PCM 14.0. In PCM 13.1 the security_view contains the rows for the templates, but in PCM 14.0 that changed. I’m not sure what the reason behind this, but it’s not a huge issue. New Template Project Differences Report This is a new report entirely built from scratch. It links each user’s project permissions back to the current template definition assigned to that project, and then reports on any discrepancies. The report checks all module permissions, all process permissions and all approval permissions. It even compares any monetary limits on contract or change order approvals. It also examines the first three characters of the template name and if the template name begins with “Ext” (representing an external user), the reports if the assignment has a missing or mismatched company restriction. The report does not identify specifically what discrepancy exists—it merely reports the discrepancy. Applying this Concept to Other Areas of PCM In my experience, most companies struggle with maintaining consistency within a PCM database. Everything from telephone number format to whether to use the Postal Code state abbreviation or fully spell out the state or province seems to offer a myriad of opportunities for inconsistency. While these can be annoying, or cause documents to look less professional, they aren’t as damaging as missing key data.
5.
COLLABORATE 14 Copyright
©2014 by Monks Project Solutions Page 5 The absence on an email address, for instance, will prevent a contact from appearing in the pick list when trying to send a PCM document via email. I’ve even experienced a case where a user added a contact on the fly, because she assumed that the person wasn’t in the company and contacts for the project since they didn’t show up when she searched for them from the email dialog. Of course, they were there, it’s just that no one had bothered to enter their email address, so PCM doesn’t show contacts who have no email address in the email dialog. With this concept in mind, the following list represents examples of multi-project exception reports that we have written for clients so that administrators can identify nonstandard or missing data. Ideally, these reports also exist as single project reports so that the individual responsible for the project can perform self-diagnostics on his or her project data, rather than having the deficiencies pointed out by the administrator. Companies missing a Key Contact Companies missing a Tax ID Number Contacts missing an email address Contacts missing a Mobile phone number Contacts missing address information Unapproved Budgeted Contracts Unapproved Committed Contracts Unapproved Purchase Orders Unapproved Change Orders Malformed Cost Codes
Download now