SlideShare a Scribd company logo
Security of Hyperion Planning
Access Permissions in Hyperion Planning
 Shared Services roles that set access permissions for managing projects, applications,
dimensions, users, and groups
Planning Elements That Can Be Assigned Access
We can assign access permissions to:
 Scenario members
 Version members
 Account members
 Entity members
 User-defined custom dimension members
 Data forms
 Task lists
 Business rules
For example, users must have these Shared Services roles to perform the specified tasks:
 Project Manager: Creates and manages projects in Shared Services.
 Provisioning Manager: Provisions users and groups to applications.
 Dimension Editor: Required for Performance Management Architect and Classic
applications. For Performance Management Architect, allows access to application
administration options for Planning. For Classic, allows access to the Classic Application
Administration options for Planning (in combination with the Planning Application Creator
role).
 Planning Application Creator: Required for Performance Management Architect and
Classic applications. For Performance Management Architect, allows users to create Planning
applications and Performance Management Architect Generic applications. For Classic,
allows access to the Classic Application Administration options for Planning (in combination
with the Dimension Editor role).
 User-defined dimensions: Assign access permissions to members by selecting the
dimension property Apply Security. If you omit setting Apply Security, all users can access
the dimension's members. By default, the Account, Entity, Scenario, and Version
dimensions are enabled for access permissions.
 Users and groups, which can vary among applications. Assign access to Planning
application elements by using Assign Access.
Note: After updating access permissions, refresh the application to update Essbase
security filters.
Types of Access Permissions:
Access permissions for the specified user or group to the dimension member, data form, or
task list include:
 Read—Allows view access
 Write—Allows view and modify access
 None—Prohibits access; the default access is None
We can specify access permission for individual users and each group. When you assign a
user to a group, that user acquires the group's access permissions. If an individual's access
permissions conflict with those of a group the user belongs to, user access permissions take
precedence.
To enable access permissions for dimensions:
 Select Administration > Dimensions.
 For Dimension, select the dimension to change.
 Click Edit.
 In Dimension Properties, select Apply Security to allow access permissions to be set on its
members. If you do not select this option, there is no security on the dimension, and users
can access its members without restriction.
 Click Save.
Click Refresh to revert to the previous values.
To assign access to members:
 Select Administration > Dimensions.
 For Dimension, select the dimension to assign access to its members.
 Select the member for which to assign access.
 Click Assign Access.
 Add, change, or remove access.
To assign access permissions to members:
 Select Administration > Dimensions.
 For Dimension, select the dimension for whose member you want to add access.
 Click Assign Access.
 Click Add Access
 Optional: To migrate a user or group's changed identity or their position in the user
directory from User Management Console to Planning, click Migrate Identities
 Optional: To remove deprovisioned or deleted users or groups from the Planning database
to conserve space, click Remove Non-provisioned Users/Groups
 For Users and Groups on Add Access, select the users and groups to access the selected
member.
 For the selected member, select the access type.
 Optional: Select a relationship.
For example, select Children to assign access to the children of the selected member.
 Click Add.
 Click Close.
To modify access permissions for members:
 Select Administration > Dimensions.
 For Dimension, select the dimension for whose member you want to edit access.
 Click Assign Access.
 Optional: To migrate a user or group's changed identity or their position in the user
directory from User Management Console to Planning, click Migrate Identities.
 Optional: To remove deprovisioned or deleted users or groups from the Planning database
to conserve space, click Remove Non-provisioned Users/Groups.
 Click Edit Access.
 For the selected member on Edit Access, select the access type for the displayed users or
groups.
 Optional: Select a relationship.
For example, select Children to assign access to children of the selected member.
 Click Set.
 Click Close.
To remove access permissions for members:
 Select Administration > Dimensions.
 For Dimension, select the dimension for whose member you want to remove access.
 Click Assign Access.
 Select the users and groups for whom to remove access to the selected member.
 Click Remove Access.
 Click OK.
 Click Close.
Regards:-
AAjjaayy ssiinngghh cchhoouuhhaann

More Related Content

What's hot

Basics of fdmee
Basics of fdmeeBasics of fdmee
Basics of fdmee
Amit Sharma
 
Oracle Hyperion Planning Best Practices
Oracle Hyperion Planning Best PracticesOracle Hyperion Planning Best Practices
Oracle Hyperion Planning Best Practices
Issam Hejazin
 
Fccs valid intersection examples
Fccs valid intersection examplesFccs valid intersection examples
Fccs valid intersection examples
RaghaviLeximon
 
OATUG Forum - Utilizing Groovy and Data Maps for Instantaneous Analysis betw...
OATUG  Forum - Utilizing Groovy and Data Maps for Instantaneous Analysis betw...OATUG  Forum - Utilizing Groovy and Data Maps for Instantaneous Analysis betw...
OATUG Forum - Utilizing Groovy and Data Maps for Instantaneous Analysis betw...
Alithya
 
Oracle FCCS: A Deep Dive
Oracle FCCS: A Deep DiveOracle FCCS: A Deep Dive
Oracle FCCS: A Deep Dive
Perficient, Inc.
 
Optimization in essbase
Optimization in essbaseOptimization in essbase
Optimization in essbase
Ajay singh chouhan
 
Hyperion Implementation Questionaries
Hyperion Implementation QuestionariesHyperion Implementation Questionaries
Hyperion Implementation Questionaries
Amit Sharma
 
Finit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEEFinit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEE
finitsolutions
 
HFM-Implementation
HFM-ImplementationHFM-Implementation
HFM-Implementation
sailajasatish
 
Key Considerations for a Successful Hyperion Planning Implementation
Key Considerations for a Successful Hyperion Planning ImplementationKey Considerations for a Successful Hyperion Planning Implementation
Key Considerations for a Successful Hyperion Planning Implementation
Alithya
 
Essmaxl
EssmaxlEssmaxl
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examples
Amit Soni
 
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examples
Amit Sharma
 
Hyperion essbase basics
Hyperion essbase basicsHyperion essbase basics
Hyperion essbase basics
Amit Sharma
 
Getting Started with FDMEE
Getting Started with FDMEEGetting Started with FDMEE
Getting Started with FDMEE
Amit Soni
 
FDMEE Taking Source Filters to the Next Level
FDMEE Taking Source Filters to the Next LevelFDMEE Taking Source Filters to the Next Level
FDMEE Taking Source Filters to the Next Level
Francisco Amores
 
Budgeting using hyperion planning vs essbase
Budgeting using hyperion planning vs essbaseBudgeting using hyperion planning vs essbase
Budgeting using hyperion planning vs essbase
Syntelli Solutions
 
HFM Zero view settings
HFM Zero view settings HFM Zero view settings
HFM Zero view settings
faizan uddin
 
Essbase intro
Essbase introEssbase intro
Essbase intro
Amit Sharma
 
Hfm to Financial Consolidation and Close Cloud
Hfm to Financial Consolidation and Close CloudHfm to Financial Consolidation and Close Cloud
Hfm to Financial Consolidation and Close Cloud
Alithya
 

What's hot (20)

Basics of fdmee
Basics of fdmeeBasics of fdmee
Basics of fdmee
 
Oracle Hyperion Planning Best Practices
Oracle Hyperion Planning Best PracticesOracle Hyperion Planning Best Practices
Oracle Hyperion Planning Best Practices
 
Fccs valid intersection examples
Fccs valid intersection examplesFccs valid intersection examples
Fccs valid intersection examples
 
OATUG Forum - Utilizing Groovy and Data Maps for Instantaneous Analysis betw...
OATUG  Forum - Utilizing Groovy and Data Maps for Instantaneous Analysis betw...OATUG  Forum - Utilizing Groovy and Data Maps for Instantaneous Analysis betw...
OATUG Forum - Utilizing Groovy and Data Maps for Instantaneous Analysis betw...
 
Oracle FCCS: A Deep Dive
Oracle FCCS: A Deep DiveOracle FCCS: A Deep Dive
Oracle FCCS: A Deep Dive
 
Optimization in essbase
Optimization in essbaseOptimization in essbase
Optimization in essbase
 
Hyperion Implementation Questionaries
Hyperion Implementation QuestionariesHyperion Implementation Questionaries
Hyperion Implementation Questionaries
 
Finit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEEFinit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEE
 
HFM-Implementation
HFM-ImplementationHFM-Implementation
HFM-Implementation
 
Key Considerations for a Successful Hyperion Planning Implementation
Key Considerations for a Successful Hyperion Planning ImplementationKey Considerations for a Successful Hyperion Planning Implementation
Key Considerations for a Successful Hyperion Planning Implementation
 
Essmaxl
EssmaxlEssmaxl
Essmaxl
 
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examples
 
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examples
 
Hyperion essbase basics
Hyperion essbase basicsHyperion essbase basics
Hyperion essbase basics
 
Getting Started with FDMEE
Getting Started with FDMEEGetting Started with FDMEE
Getting Started with FDMEE
 
FDMEE Taking Source Filters to the Next Level
FDMEE Taking Source Filters to the Next LevelFDMEE Taking Source Filters to the Next Level
FDMEE Taking Source Filters to the Next Level
 
Budgeting using hyperion planning vs essbase
Budgeting using hyperion planning vs essbaseBudgeting using hyperion planning vs essbase
Budgeting using hyperion planning vs essbase
 
HFM Zero view settings
HFM Zero view settings HFM Zero view settings
HFM Zero view settings
 
Essbase intro
Essbase introEssbase intro
Essbase intro
 
Hfm to Financial Consolidation and Close Cloud
Hfm to Financial Consolidation and Close CloudHfm to Financial Consolidation and Close Cloud
Hfm to Financial Consolidation and Close Cloud
 

Similar to Security of hyperion planning

August 12: Sugar’s Security Model – Teams and Roles
August 12: Sugar’s Security Model – Teams and Roles August 12: Sugar’s Security Model – Teams and Roles
August 12: Sugar’s Security Model – Teams and Roles
ticomixcrm
 
Unit 4 The Design and Layout of LMS Management Plan
Unit 4 The Design and Layout of LMS Management Plan Unit 4 The Design and Layout of LMS Management Plan
Unit 4 The Design and Layout of LMS Management Plan
Connie Darr
 
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Sami JAMMALI
 
Files and folders
Files and foldersFiles and folders
Files and folders
catacutanjcsantos
 
TrackStudio Permissions
TrackStudio PermissionsTrackStudio Permissions
TrackStudio Permissions
Maxim Kramarenko
 
Fastman Permissions Manager
Fastman Permissions ManagerFastman Permissions Manager
Fastman Permissions Manager
Fastman
 
Configuring Sites, Users and Groups
Configuring Sites, Users and GroupsConfiguring Sites, Users and Groups
Configuring Sites, Users and Groups
SyAM Software
 
Profiles and permission sets
Profiles and permission setsProfiles and permission sets
Profiles and permission sets
Vishesh Singhal
 
Salesforce admin training 2
Salesforce admin training 2Salesforce admin training 2
Salesforce admin training 2
HungPham381
 
SalesLoft Team Cadences
SalesLoft Team Cadences SalesLoft Team Cadences
SalesLoft Team Cadences
SalesLoftTraining
 
SA03 - Overview of Access Groups
SA03 - Overview of Access GroupsSA03 - Overview of Access Groups
SA03 - Overview of Access Groups
Maintenance Connection
 
24 - Panorama Necto 14 administration - visualization & data discovery solution
24  - Panorama Necto 14 administration - visualization & data discovery solution24  - Panorama Necto 14 administration - visualization & data discovery solution
24 - Panorama Necto 14 administration - visualization & data discovery solution
Panorama Software
 
Anypoint access management - Users
Anypoint access management - UsersAnypoint access management - Users
Anypoint access management - Users
Shanky Gupta
 
Groups access rights
Groups   access rightsGroups   access rights
Groups access rights
Bond Seidel
 
Hr profile option
Hr profile optionHr profile option
Hr profile option
Feras Ahmad
 
Acp policies
Acp policiesAcp policies
Acp policies
Laxmi Kanth Kshatriya
 
Actonic GDPR Tools for Confluence
Actonic GDPR Tools for Confluence  Actonic GDPR Tools for Confluence
Actonic GDPR Tools for Confluence
Actonic App Doc
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
AntonioMaio2
 
Blog Management System
Blog Management SystemBlog Management System
Blog Management System
StudentRocks
 
Liferay control pannel
Liferay control pannelLiferay control pannel
Liferay control pannel
Abhishek Shrivastava
 

Similar to Security of hyperion planning (20)

August 12: Sugar’s Security Model – Teams and Roles
August 12: Sugar’s Security Model – Teams and Roles August 12: Sugar’s Security Model – Teams and Roles
August 12: Sugar’s Security Model – Teams and Roles
 
Unit 4 The Design and Layout of LMS Management Plan
Unit 4 The Design and Layout of LMS Management Plan Unit 4 The Design and Layout of LMS Management Plan
Unit 4 The Design and Layout of LMS Management Plan
 
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
 
Files and folders
Files and foldersFiles and folders
Files and folders
 
TrackStudio Permissions
TrackStudio PermissionsTrackStudio Permissions
TrackStudio Permissions
 
Fastman Permissions Manager
Fastman Permissions ManagerFastman Permissions Manager
Fastman Permissions Manager
 
Configuring Sites, Users and Groups
Configuring Sites, Users and GroupsConfiguring Sites, Users and Groups
Configuring Sites, Users and Groups
 
Profiles and permission sets
Profiles and permission setsProfiles and permission sets
Profiles and permission sets
 
Salesforce admin training 2
Salesforce admin training 2Salesforce admin training 2
Salesforce admin training 2
 
SalesLoft Team Cadences
SalesLoft Team Cadences SalesLoft Team Cadences
SalesLoft Team Cadences
 
SA03 - Overview of Access Groups
SA03 - Overview of Access GroupsSA03 - Overview of Access Groups
SA03 - Overview of Access Groups
 
24 - Panorama Necto 14 administration - visualization & data discovery solution
24  - Panorama Necto 14 administration - visualization & data discovery solution24  - Panorama Necto 14 administration - visualization & data discovery solution
24 - Panorama Necto 14 administration - visualization & data discovery solution
 
Anypoint access management - Users
Anypoint access management - UsersAnypoint access management - Users
Anypoint access management - Users
 
Groups access rights
Groups   access rightsGroups   access rights
Groups access rights
 
Hr profile option
Hr profile optionHr profile option
Hr profile option
 
Acp policies
Acp policiesAcp policies
Acp policies
 
Actonic GDPR Tools for Confluence
Actonic GDPR Tools for Confluence  Actonic GDPR Tools for Confluence
Actonic GDPR Tools for Confluence
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
 
Blog Management System
Blog Management SystemBlog Management System
Blog Management System
 
Liferay control pannel
Liferay control pannelLiferay control pannel
Liferay control pannel
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

Security of hyperion planning

  • 1. Security of Hyperion Planning Access Permissions in Hyperion Planning  Shared Services roles that set access permissions for managing projects, applications, dimensions, users, and groups Planning Elements That Can Be Assigned Access We can assign access permissions to:  Scenario members  Version members  Account members  Entity members  User-defined custom dimension members  Data forms  Task lists  Business rules For example, users must have these Shared Services roles to perform the specified tasks:  Project Manager: Creates and manages projects in Shared Services.  Provisioning Manager: Provisions users and groups to applications.  Dimension Editor: Required for Performance Management Architect and Classic applications. For Performance Management Architect, allows access to application administration options for Planning. For Classic, allows access to the Classic Application Administration options for Planning (in combination with the Planning Application Creator role).  Planning Application Creator: Required for Performance Management Architect and Classic applications. For Performance Management Architect, allows users to create Planning applications and Performance Management Architect Generic applications. For Classic, allows access to the Classic Application Administration options for Planning (in combination with the Dimension Editor role).  User-defined dimensions: Assign access permissions to members by selecting the dimension property Apply Security. If you omit setting Apply Security, all users can access the dimension's members. By default, the Account, Entity, Scenario, and Version dimensions are enabled for access permissions.  Users and groups, which can vary among applications. Assign access to Planning application elements by using Assign Access. Note: After updating access permissions, refresh the application to update Essbase security filters.
  • 2. Types of Access Permissions: Access permissions for the specified user or group to the dimension member, data form, or task list include:  Read—Allows view access  Write—Allows view and modify access  None—Prohibits access; the default access is None We can specify access permission for individual users and each group. When you assign a user to a group, that user acquires the group's access permissions. If an individual's access permissions conflict with those of a group the user belongs to, user access permissions take precedence. To enable access permissions for dimensions:  Select Administration > Dimensions.  For Dimension, select the dimension to change.  Click Edit.  In Dimension Properties, select Apply Security to allow access permissions to be set on its members. If you do not select this option, there is no security on the dimension, and users can access its members without restriction.  Click Save. Click Refresh to revert to the previous values. To assign access to members:  Select Administration > Dimensions.  For Dimension, select the dimension to assign access to its members.  Select the member for which to assign access.  Click Assign Access.  Add, change, or remove access. To assign access permissions to members:  Select Administration > Dimensions.  For Dimension, select the dimension for whose member you want to add access.  Click Assign Access.  Click Add Access  Optional: To migrate a user or group's changed identity or their position in the user directory from User Management Console to Planning, click Migrate Identities  Optional: To remove deprovisioned or deleted users or groups from the Planning database to conserve space, click Remove Non-provisioned Users/Groups  For Users and Groups on Add Access, select the users and groups to access the selected member.  For the selected member, select the access type.  Optional: Select a relationship.
  • 3. For example, select Children to assign access to the children of the selected member.  Click Add.  Click Close. To modify access permissions for members:  Select Administration > Dimensions.  For Dimension, select the dimension for whose member you want to edit access.  Click Assign Access.  Optional: To migrate a user or group's changed identity or their position in the user directory from User Management Console to Planning, click Migrate Identities.  Optional: To remove deprovisioned or deleted users or groups from the Planning database to conserve space, click Remove Non-provisioned Users/Groups.  Click Edit Access.  For the selected member on Edit Access, select the access type for the displayed users or groups.  Optional: Select a relationship. For example, select Children to assign access to children of the selected member.  Click Set.  Click Close. To remove access permissions for members:  Select Administration > Dimensions.  For Dimension, select the dimension for whose member you want to remove access.  Click Assign Access.  Select the users and groups for whom to remove access to the selected member.  Click Remove Access.  Click OK.  Click Close. Regards:- AAjjaayy ssiinngghh cchhoouuhhaann