SlideShare a Scribd company logo
14
Copyright © 2008, Oracle. All rights reserved.
Assigning Access to Data and Documents
Copyright © 2008, Oracle. All rights reserved.
Objectives
After completing this lesson, you should be able to:
• Describe application settings for security
• Explain how users’ data and document access rights are
determined
• Define security classes
• Assign users and groups access to security classes
• Run security reports
• Configure security auditing
• Run auditing reports
• Load and extract security files
• Migrate security
Copyright © 2008, Oracle. All rights reserved.
Application Settings and Security
Application settings
Entity dimension
East Sales
(Member Attribute)
SecurityClass = US
Account Scenario Custom1 Custom2 Custom3 Custom4ICP
UseSecurityForEntities = Y
UseSecurityForAccounts = Y
UseSecurityForScenario = Y
Security classes
US
Europe
Australia
Copyright © 2008, Oracle. All rights reserved.
Data Access
Access to a data cell is determined by the user’s most
restrictive member access.
Member
User
Access
to Member
Sales All
Costs Read
Florida All
France None
All/None
Read/None
All/All
Read/All
Copyright © 2008, Oracle. All rights reserved.
Document Access
Every document has a security class.
Copyright © 2008, Oracle. All rights reserved.
Defining Security Classes
You associate the security class dimension with the Security
Class properties of the dimensions for which security is
enabled.
[Default] is a system-
generated security
class.
Dimension association
Copyright © 2008, Oracle. All rights reserved.
Assigning Access to Security Classes
Assigns access for the currently
selected cells
Enables email alerts
Copyright © 2008, Oracle. All rights reserved.
Running Security Reports
Copyright © 2008, Oracle. All rights reserved.
Configuring Security Auditing
Configure auditing at
– Global level for all applications
– Project level for specified projects
– Application level for specified applications
Specify activities to audit at global, project, and application
levels
Global Project Application
Copyright © 2008, Oracle. All rights reserved.
Running Auditing Reports
Copyright © 2008, Oracle. All rights reserved.
Loading Security Files
!USERS_AND_GROUPS
FINAPPSAdminGroup
FINAPPSChrisW
FINAPPSPatM
!ROLE_ACCESS
Administrator;FINAPPStrnadmin
Load System; FINAPPSAdminGroup
Reviewer1; FINAPPSPatM
!SECURITY_CLASS_ACCESS
System;FINAPPSAdminGroup;All;Y
System;FINAPPSChrisW;Read;Y
Europe;FINAPPSChrisW;All;Y
Copyright © 2008, Oracle. All rights reserved.
Loading Security
Copyright © 2008, Oracle. All rights reserved.
Extracting Security
Copyright © 2008, Oracle. All rights reserved.
Migrating Security
Use the Application Migration Wizard to migrate security
artifacts.
Define Migration
Copyright © 2008, Oracle. All rights reserved.
Summary
In this lesson, you should have learned to:
• Describe application settings for security
• Explain how users’ data and document access rights are
determined
• Create security classes
• Assign users and groups access to security classes
• Run security reports
• Configure security auditing
• Run auditing reports
• Load and extract security files
• Migrate security

More Related Content

Similar to L14 assigning access

OpenStack Murano
OpenStack MuranoOpenStack Murano
OpenStack Murano
openstackstl
 
L13 adding users
L13 adding usersL13 adding users
L13 adding users
Naresh Kumar SAHU
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
 
Java Card Platform Security and Performance
Java Card Platform Security and PerformanceJava Card Platform Security and Performance
Java Card Platform Security and Performance
Eric Vétillard
 
42 minutes to secure your code....
42 minutes to secure your code....42 minutes to secure your code....
42 minutes to secure your code....
Sebastien Gioria
 
2015 09-18-jug summer camp
2015 09-18-jug summer camp2015 09-18-jug summer camp
2015 09-18-jug summer camp
Sebastien Gioria
 
Automating security hardening
Automating security hardeningAutomating security hardening
Automating security hardening
Ugljesa Novak, CISSP
 
Safety-Critical Systems and The Benefits of Using Ada
Safety-Critical Systems and The Benefits of Using AdaSafety-Critical Systems and The Benefits of Using Ada
Safety-Critical Systems and The Benefits of Using Ada
Adrian Hoe
 
Purnima
PurnimaPurnima
Purnima
Purnima V
 
The PeriCAT Framework
The PeriCAT FrameworkThe PeriCAT Framework
The PeriCAT Framework
PERICLES_FP7
 
Oracle ORAchk & EXAchk overview
Oracle ORAchk & EXAchk overviewOracle ORAchk & EXAchk overview
Oracle ORAchk & EXAchk overview
Gareth Chapman
 
Exachk Customer Presentation
Exachk Customer PresentationExachk Customer Presentation
Exachk Customer Presentation
Sandesh Rao
 
How to Use OWASP Security Logging
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security Logging
Milton Smith
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
WebLogic Performance Monitoring - OFM Canberra July 2014
WebLogic Performance Monitoring - OFM Canberra July 2014WebLogic Performance Monitoring - OFM Canberra July 2014
WebLogic Performance Monitoring - OFM Canberra July 2014
Joelith
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
run_frictionless
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara
 
App c classicadmin2
App c classicadmin2App c classicadmin2
App c classicadmin2
Naresh Kumar SAHU
 
Ebs performance tuning session feb 13 2013---Presented by Oracle
Ebs performance tuning session  feb 13 2013---Presented by OracleEbs performance tuning session  feb 13 2013---Presented by Oracle
Ebs performance tuning session feb 13 2013---Presented by Oracle
Akash Pramanik
 
App c classicadmin
App c classicadminApp c classicadmin
App c classicadmin
Naresh Kumar SAHU
 

Similar to L14 assigning access (20)

OpenStack Murano
OpenStack MuranoOpenStack Murano
OpenStack Murano
 
L13 adding users
L13 adding usersL13 adding users
L13 adding users
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
Java Card Platform Security and Performance
Java Card Platform Security and PerformanceJava Card Platform Security and Performance
Java Card Platform Security and Performance
 
42 minutes to secure your code....
42 minutes to secure your code....42 minutes to secure your code....
42 minutes to secure your code....
 
2015 09-18-jug summer camp
2015 09-18-jug summer camp2015 09-18-jug summer camp
2015 09-18-jug summer camp
 
Automating security hardening
Automating security hardeningAutomating security hardening
Automating security hardening
 
Safety-Critical Systems and The Benefits of Using Ada
Safety-Critical Systems and The Benefits of Using AdaSafety-Critical Systems and The Benefits of Using Ada
Safety-Critical Systems and The Benefits of Using Ada
 
Purnima
PurnimaPurnima
Purnima
 
The PeriCAT Framework
The PeriCAT FrameworkThe PeriCAT Framework
The PeriCAT Framework
 
Oracle ORAchk & EXAchk overview
Oracle ORAchk & EXAchk overviewOracle ORAchk & EXAchk overview
Oracle ORAchk & EXAchk overview
 
Exachk Customer Presentation
Exachk Customer PresentationExachk Customer Presentation
Exachk Customer Presentation
 
How to Use OWASP Security Logging
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security Logging
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
WebLogic Performance Monitoring - OFM Canberra July 2014
WebLogic Performance Monitoring - OFM Canberra July 2014WebLogic Performance Monitoring - OFM Canberra July 2014
WebLogic Performance Monitoring - OFM Canberra July 2014
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
App c classicadmin2
App c classicadmin2App c classicadmin2
App c classicadmin2
 
Ebs performance tuning session feb 13 2013---Presented by Oracle
Ebs performance tuning session  feb 13 2013---Presented by OracleEbs performance tuning session  feb 13 2013---Presented by Oracle
Ebs performance tuning session feb 13 2013---Presented by Oracle
 
App c classicadmin
App c classicadminApp c classicadmin
App c classicadmin
 

More from Naresh Kumar SAHU

L22 analyzing data using smart view
L22 analyzing data using smart viewL22 analyzing data using smart view
L22 analyzing data using smart view
Naresh Kumar SAHU
 
L21 sharing data using data synchronization
L21 sharing data using data synchronizationL21 sharing data using data synchronization
L21 sharing data using data synchronization
Naresh Kumar SAHU
 
L20 managing the review cycle using process management
L20 managing the review cycle using process managementL20 managing the review cycle using process management
L20 managing the review cycle using process management
Naresh Kumar SAHU
 
L18 adjusting data with journals
L18 adjusting data with journalsL18 adjusting data with journals
L18 adjusting data with journals
Naresh Kumar SAHU
 
L16 creating tasklists
L16 creating tasklistsL16 creating tasklists
L16 creating tasklists
Naresh Kumar SAHU
 
L15 data forms
L15 data formsL15 data forms
L15 data forms
Naresh Kumar SAHU
 
L12 managing rules
L12 managing rulesL12 managing rules
L12 managing rules
Naresh Kumar SAHU
 
L11 creating member lists
L11 creating member listsL11 creating member lists
L11 creating member lists
Naresh Kumar SAHU
 
L10 entering data using data grids
L10 entering data using data gridsL10 entering data using data grids
L10 entering data using data grids
Naresh Kumar SAHU
 
L09 loading data
L09 loading dataL09 loading data
L09 loading data
Naresh Kumar SAHU
 
L08 deploying applications
L08 deploying applicationsL08 deploying applications
L08 deploying applications
Naresh Kumar SAHU
 
L07 entities scenarios
L07 entities scenariosL07 entities scenarios
L07 entities scenarios
Naresh Kumar SAHU
 
L06 accounts custom
L06 accounts customL06 accounts custom
L06 accounts custom
Naresh Kumar SAHU
 
L05 creating applicationviews
L05 creating applicationviewsL05 creating applicationviews
L05 creating applicationviews
Naresh Kumar SAHU
 
L04 loading metadata
L04 loading metadataL04 loading metadata
L04 loading metadata
Naresh Kumar SAHU
 
L03 managing dimensions
L03 managing dimensionsL03 managing dimensions
L03 managing dimensions
Naresh Kumar SAHU
 
L02 navigate
L02 navigateL02 navigate
L02 navigate
Naresh Kumar SAHU
 
L01 intro
L01 introL01 intro
App a automating tasks
App a automating tasksApp a automating tasks
App a automating tasks
Naresh Kumar SAHU
 
App b intercompanytrans
App b intercompanytransApp b intercompanytrans
App b intercompanytrans
Naresh Kumar SAHU
 

More from Naresh Kumar SAHU (20)

L22 analyzing data using smart view
L22 analyzing data using smart viewL22 analyzing data using smart view
L22 analyzing data using smart view
 
L21 sharing data using data synchronization
L21 sharing data using data synchronizationL21 sharing data using data synchronization
L21 sharing data using data synchronization
 
L20 managing the review cycle using process management
L20 managing the review cycle using process managementL20 managing the review cycle using process management
L20 managing the review cycle using process management
 
L18 adjusting data with journals
L18 adjusting data with journalsL18 adjusting data with journals
L18 adjusting data with journals
 
L16 creating tasklists
L16 creating tasklistsL16 creating tasklists
L16 creating tasklists
 
L15 data forms
L15 data formsL15 data forms
L15 data forms
 
L12 managing rules
L12 managing rulesL12 managing rules
L12 managing rules
 
L11 creating member lists
L11 creating member listsL11 creating member lists
L11 creating member lists
 
L10 entering data using data grids
L10 entering data using data gridsL10 entering data using data grids
L10 entering data using data grids
 
L09 loading data
L09 loading dataL09 loading data
L09 loading data
 
L08 deploying applications
L08 deploying applicationsL08 deploying applications
L08 deploying applications
 
L07 entities scenarios
L07 entities scenariosL07 entities scenarios
L07 entities scenarios
 
L06 accounts custom
L06 accounts customL06 accounts custom
L06 accounts custom
 
L05 creating applicationviews
L05 creating applicationviewsL05 creating applicationviews
L05 creating applicationviews
 
L04 loading metadata
L04 loading metadataL04 loading metadata
L04 loading metadata
 
L03 managing dimensions
L03 managing dimensionsL03 managing dimensions
L03 managing dimensions
 
L02 navigate
L02 navigateL02 navigate
L02 navigate
 
L01 intro
L01 introL01 intro
L01 intro
 
App a automating tasks
App a automating tasksApp a automating tasks
App a automating tasks
 
App b intercompanytrans
App b intercompanytransApp b intercompanytrans
App b intercompanytrans
 

L14 assigning access

  • 1. 14 Copyright © 2008, Oracle. All rights reserved. Assigning Access to Data and Documents
  • 2. Copyright © 2008, Oracle. All rights reserved. Objectives After completing this lesson, you should be able to: • Describe application settings for security • Explain how users’ data and document access rights are determined • Define security classes • Assign users and groups access to security classes • Run security reports • Configure security auditing • Run auditing reports • Load and extract security files • Migrate security
  • 3. Copyright © 2008, Oracle. All rights reserved. Application Settings and Security Application settings Entity dimension East Sales (Member Attribute) SecurityClass = US Account Scenario Custom1 Custom2 Custom3 Custom4ICP UseSecurityForEntities = Y UseSecurityForAccounts = Y UseSecurityForScenario = Y Security classes US Europe Australia
  • 4. Copyright © 2008, Oracle. All rights reserved. Data Access Access to a data cell is determined by the user’s most restrictive member access. Member User Access to Member Sales All Costs Read Florida All France None All/None Read/None All/All Read/All
  • 5. Copyright © 2008, Oracle. All rights reserved. Document Access Every document has a security class.
  • 6. Copyright © 2008, Oracle. All rights reserved. Defining Security Classes You associate the security class dimension with the Security Class properties of the dimensions for which security is enabled. [Default] is a system- generated security class. Dimension association
  • 7. Copyright © 2008, Oracle. All rights reserved. Assigning Access to Security Classes Assigns access for the currently selected cells Enables email alerts
  • 8. Copyright © 2008, Oracle. All rights reserved. Running Security Reports
  • 9. Copyright © 2008, Oracle. All rights reserved. Configuring Security Auditing Configure auditing at – Global level for all applications – Project level for specified projects – Application level for specified applications Specify activities to audit at global, project, and application levels Global Project Application
  • 10. Copyright © 2008, Oracle. All rights reserved. Running Auditing Reports
  • 11. Copyright © 2008, Oracle. All rights reserved. Loading Security Files !USERS_AND_GROUPS FINAPPSAdminGroup FINAPPSChrisW FINAPPSPatM !ROLE_ACCESS Administrator;FINAPPStrnadmin Load System; FINAPPSAdminGroup Reviewer1; FINAPPSPatM !SECURITY_CLASS_ACCESS System;FINAPPSAdminGroup;All;Y System;FINAPPSChrisW;Read;Y Europe;FINAPPSChrisW;All;Y
  • 12. Copyright © 2008, Oracle. All rights reserved. Loading Security
  • 13. Copyright © 2008, Oracle. All rights reserved. Extracting Security
  • 14. Copyright © 2008, Oracle. All rights reserved. Migrating Security Use the Application Migration Wizard to migrate security artifacts. Define Migration
  • 15. Copyright © 2008, Oracle. All rights reserved. Summary In this lesson, you should have learned to: • Describe application settings for security • Explain how users’ data and document access rights are determined • Create security classes • Assign users and groups access to security classes • Run security reports • Configure security auditing • Run auditing reports • Load and extract security files • Migrate security

Editor's Notes

  1. Data Access Each data cell in an application represents an intersection of dimension members. A user’s access to a data cell is determined by the user’s most restrictive access right to the dimension members for that intersection. You assign access rights to a member indirectly through its security class. For example, the security class for the Sales and Net Profit members could be IncomeAccounts. If you assign John Read access to the IncomeAccounts security class, he receives read access to the Sales and NetProfit members. For the example shown on the slide, at the intersection of TotalCosts and Florida, the user has Read access to the TotalCosts member and All access to the Florida member. Therefore, the user has Read access to the cell. At the intersection of TotalCosts and France, the user has Read access to the TotalCosts member and None access to the France member. Therefore, the user has no access to TotalCosts France.
  2. Document Access Every document in Hyperion Financial Management has an assigned security class. Users’ access to a document is determined by their access rights to the security class. The following table describes the document access rights. Document AccessDescription NoneThe document does not display in the list of documents. ReadUsers can open the document. For data entry forms and data grids, users can modify data based on their access rights to the members in the rows and columns. For Journals, the journal data is read-only. User cannot modify the document. For example, they cannot add rows or columns to a data grid. AllUsers can open the document and save their modifications to the document.
  3. Defining Security Classes Security classes define user or group access rights to elements in an application. You use the Define Security Classes task in the Hyperion Financial Management Windows client to define security classes. Security class names can be up to 20 characters in length and can include spaces. Default Security Class A system-generated security class called DEFAULT is created as part of an application. The security class DEFAULT has these properties: The security class DEFAULT cannot be deleted or modified by users. You can assign access rights to the security class DEFAULT. Any member without a security class (where the security class = <blank>) is treated as having the security class DEFAULT. Deleting Security Classes When you no longer need a security class, you can delete it. However, it is not automatically deleted from the metadata with which you associated it. To disassociate the security class from entities, accounts, and scenarios, you must use the Metadata Manager.
  4. Assigning Access to Security Classes After you define security classes, you assign users and groups access rights to them. To assign access to security classes, you use the Configure Access task in the Windows client. There are four types of access rights: Access RightDescription AllUser or group can modify any application element with the specified security class assigned. PromoteUser or group can view data for elements assigned to the security class and can promote or reject. ReadUser or group can view data for elements assigned to the security class but cannot promote or reject. Metadata User can view metadata. NoneUser or group cannot access any application element with the specified security class assigned. None is the default. There are two views available for assigning roles under Configure Access. The Security Classes by User/Group view lets you select a user or group and lists the available security classes. The Users/Groups by Security Class view lets you select a security class and list all the users and groups in the application. The slide example shows the Security Classes by User/Group view.
  5. Security Load Files In addition to using the Windows client to add users and groups and assign access, you can load security information from a text file. The slide example shows the format for each section of the file. The USERS_AND_GROUPS section contains a list of users and groups that have access to a Hyperion Financial Management application. The Microsoft Windows domain name for the user or group must be specified first, followed by a backslash and the user or group name. The SECURITY_CLASSES section contains a list of user-defined security classes that you can assign to Hyperion Financial Management dimension members, such as Entities. The ROLE_ACCESS section contains a list of users and groups that are assigned to pre-defined Hyperion Financial Management roles. The SECURITY_CLASS_ACCESS section contains a list of rights, by security class, for users and groups. By default, the rights for users and groups is NONE, unless otherwise specified. Therefore, specifying NONE for a user or group is not necessary, unless you are changing a user’s or group’s current rights from ALL or READ to NONE. The security class must be specified first, followed by the Microsoft Windows domain name for the user or group, a backslash, the user or group name, and the access right.
  6. Loading Security Security information load files can be in an ASCII format, supporting multibyte character sets (MBCS) or a Unicode format, using Little Endian byte ordering. The default file name extension for security information load files is .SEC. When you load the file, you can select to clear the application’s existing security information before beginning the load. You also can select to validate that users and groups in the load file are valid Microsoft Windows users and groups. Any user or group that cannot be validated is not added to the application, and a warning message is saved in the log file. If you do not select the validate option, all users and groups are added, whether or not they are valid Microsoft Windows users and groups. Hyperion Financial Management attempts to validate users and groups when they try to access an application.
  7. Extracting Security You can extract security information to a file. You select a delimiter for the file and the security elements that you want to include.