SlideShare a Scribd company logo
2
Most read
Security of Hyperion Planning
Access Permissions in Hyperion Planning
 Shared Services roles that set access permissions for managing projects, applications,
dimensions, users, and groups
Planning Elements That Can Be Assigned Access
We can assign access permissions to:
 Scenario members
 Version members
 Account members
 Entity members
 User-defined custom dimension members
 Data forms
 Task lists
 Business rules
For example, users must have these Shared Services roles to perform the specified tasks:
 Project Manager: Creates and manages projects in Shared Services.
 Provisioning Manager: Provisions users and groups to applications.
 Dimension Editor: Required for Performance Management Architect and Classic
applications. For Performance Management Architect, allows access to application
administration options for Planning. For Classic, allows access to the Classic Application
Administration options for Planning (in combination with the Planning Application Creator
role).
 Planning Application Creator: Required for Performance Management Architect and
Classic applications. For Performance Management Architect, allows users to create Planning
applications and Performance Management Architect Generic applications. For Classic,
allows access to the Classic Application Administration options for Planning (in combination
with the Dimension Editor role).
 User-defined dimensions: Assign access permissions to members by selecting the
dimension property Apply Security. If you omit setting Apply Security, all users can access
the dimension's members. By default, the Account, Entity, Scenario, and Version
dimensions are enabled for access permissions.
 Users and groups, which can vary among applications. Assign access to Planning
application elements by using Assign Access.
Note: After updating access permissions, refresh the application to update Essbase
security filters.
Types of Access Permissions:
Access permissions for the specified user or group to the dimension member, data form, or
task list include:
 Read—Allows view access
 Write—Allows view and modify access
 None—Prohibits access; the default access is None
We can specify access permission for individual users and each group. When you assign a
user to a group, that user acquires the group's access permissions. If an individual's access
permissions conflict with those of a group the user belongs to, user access permissions take
precedence.
To enable access permissions for dimensions:
 Select Administration > Dimensions.
 For Dimension, select the dimension to change.
 Click Edit.
 In Dimension Properties, select Apply Security to allow access permissions to be set on its
members. If you do not select this option, there is no security on the dimension, and users
can access its members without restriction.
 Click Save.
Click Refresh to revert to the previous values.
To assign access to members:
 Select Administration > Dimensions.
 For Dimension, select the dimension to assign access to its members.
 Select the member for which to assign access.
 Click Assign Access.
 Add, change, or remove access.
To assign access permissions to members:
 Select Administration > Dimensions.
 For Dimension, select the dimension for whose member you want to add access.
 Click Assign Access.
 Click Add Access
 Optional: To migrate a user or group's changed identity or their position in the user
directory from User Management Console to Planning, click Migrate Identities
 Optional: To remove deprovisioned or deleted users or groups from the Planning database
to conserve space, click Remove Non-provisioned Users/Groups
 For Users and Groups on Add Access, select the users and groups to access the selected
member.
 For the selected member, select the access type.
 Optional: Select a relationship.
For example, select Children to assign access to the children of the selected member.
 Click Add.
 Click Close.
To modify access permissions for members:
 Select Administration > Dimensions.
 For Dimension, select the dimension for whose member you want to edit access.
 Click Assign Access.
 Optional: To migrate a user or group's changed identity or their position in the user
directory from User Management Console to Planning, click Migrate Identities.
 Optional: To remove deprovisioned or deleted users or groups from the Planning database
to conserve space, click Remove Non-provisioned Users/Groups.
 Click Edit Access.
 For the selected member on Edit Access, select the access type for the displayed users or
groups.
 Optional: Select a relationship.
For example, select Children to assign access to children of the selected member.
 Click Set.
 Click Close.
To remove access permissions for members:
 Select Administration > Dimensions.
 For Dimension, select the dimension for whose member you want to remove access.
 Click Assign Access.
 Select the users and groups for whom to remove access to the selected member.
 Click Remove Access.
 Click OK.
 Click Close.
Regards:-
AAjjaayy ssiinngghh cchhoouuhhaann

More Related Content

PPT
Hyperion Planning Security
PPTX
03. data forms in hyperion planning
DOCX
Calculation commands in essbase
PPTX
Dimensionality & Dimensions of Hyperion Planning
PDF
Essbase security implementation
DOCX
Optimization in essbase
DOC
Planning learn step by step
PDF
Currency Translation in HFM
Hyperion Planning Security
03. data forms in hyperion planning
Calculation commands in essbase
Dimensionality & Dimensions of Hyperion Planning
Essbase security implementation
Optimization in essbase
Planning learn step by step
Currency Translation in HFM

What's hot (20)

PPT
Hyperion LCM Utility
PPT
FDMEE Tutorial - Part 1
DOC
Hyperion essbase basics
PDF
HFM Business Rule Writing Tips and Techniques
PDF
FDMEE Taking Source Filters to the Next Level
PDF
FDMEE script examples
PDF
PDF
Getting Started with FDMEE
PPT
Hyperion essbase overview
PPT
Oracle Hyperion Planning Best Practices
PPT
HFM-Implementation
PDF
Basics of fdmee
PDF
FDMEE script examples
PDF
Oracle fccs creating new application
PPTX
It's Time to Reassess Your FDM Mappings
PPT
Key Considerations for a Successful Hyperion Planning Implementation
PDF
Budgeting using hyperion planning vs essbase
PPTX
Oracle Hyperion and Planning Public Sector Budgeting
PPTX
Oracle Project Financial Management Cloud in 9 Weeks
PDF
Oracle FCCS Getting Started Guide II
Hyperion LCM Utility
FDMEE Tutorial - Part 1
Hyperion essbase basics
HFM Business Rule Writing Tips and Techniques
FDMEE Taking Source Filters to the Next Level
FDMEE script examples
Getting Started with FDMEE
Hyperion essbase overview
Oracle Hyperion Planning Best Practices
HFM-Implementation
Basics of fdmee
FDMEE script examples
Oracle fccs creating new application
It's Time to Reassess Your FDM Mappings
Key Considerations for a Successful Hyperion Planning Implementation
Budgeting using hyperion planning vs essbase
Oracle Hyperion and Planning Public Sector Budgeting
Oracle Project Financial Management Cloud in 9 Weeks
Oracle FCCS Getting Started Guide II
Ad

Similar to Security of hyperion planning (20)

PPTX
August 12: Sugar’s Security Model – Teams and Roles
PPTX
Unit 4 The Design and Layout of LMS Management Plan
PDF
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
PPTX
Files and folders
PPT
TrackStudio Permissions
PPTX
Fastman Permissions Manager
PPTX
Configuring Sites, Users and Groups
PPTX
Profiles and permission sets
PPTX
Salesforce admin training 2
PPTX
Operationalzing ThousandEyes in your Organization.pptx
PDF
SalesLoft Team Cadences
PDF
SA03 - Overview of Access Groups
PPTX
24 - Panorama Necto 14 administration - visualization & data discovery solution
PPTX
How to Configure Project Visibility & Access Rights in Odoo 17 Project App
PPTX
Anypoint access management - Users
PPTX
Groups access rights
DOCX
Hr profile option
PDF
Acp policies
PPTX
Mastering Sitecore Users Roles and Security: A Beginner's Guide to Streamline...
PDF
Summer24-ReleaseOverviewDeck - Stephen Stanley 27 June 2024.pdf
August 12: Sugar’s Security Model – Teams and Roles
Unit 4 The Design and Layout of LMS Management Plan
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Files and folders
TrackStudio Permissions
Fastman Permissions Manager
Configuring Sites, Users and Groups
Profiles and permission sets
Salesforce admin training 2
Operationalzing ThousandEyes in your Organization.pptx
SalesLoft Team Cadences
SA03 - Overview of Access Groups
24 - Panorama Necto 14 administration - visualization & data discovery solution
How to Configure Project Visibility & Access Rights in Odoo 17 Project App
Anypoint access management - Users
Groups access rights
Hr profile option
Acp policies
Mastering Sitecore Users Roles and Security: A Beginner's Guide to Streamline...
Summer24-ReleaseOverviewDeck - Stephen Stanley 27 June 2024.pdf
Ad

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Unlocking AI with Model Context Protocol (MCP)
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing

Security of hyperion planning

  • 1. Security of Hyperion Planning Access Permissions in Hyperion Planning  Shared Services roles that set access permissions for managing projects, applications, dimensions, users, and groups Planning Elements That Can Be Assigned Access We can assign access permissions to:  Scenario members  Version members  Account members  Entity members  User-defined custom dimension members  Data forms  Task lists  Business rules For example, users must have these Shared Services roles to perform the specified tasks:  Project Manager: Creates and manages projects in Shared Services.  Provisioning Manager: Provisions users and groups to applications.  Dimension Editor: Required for Performance Management Architect and Classic applications. For Performance Management Architect, allows access to application administration options for Planning. For Classic, allows access to the Classic Application Administration options for Planning (in combination with the Planning Application Creator role).  Planning Application Creator: Required for Performance Management Architect and Classic applications. For Performance Management Architect, allows users to create Planning applications and Performance Management Architect Generic applications. For Classic, allows access to the Classic Application Administration options for Planning (in combination with the Dimension Editor role).  User-defined dimensions: Assign access permissions to members by selecting the dimension property Apply Security. If you omit setting Apply Security, all users can access the dimension's members. By default, the Account, Entity, Scenario, and Version dimensions are enabled for access permissions.  Users and groups, which can vary among applications. Assign access to Planning application elements by using Assign Access. Note: After updating access permissions, refresh the application to update Essbase security filters.
  • 2. Types of Access Permissions: Access permissions for the specified user or group to the dimension member, data form, or task list include:  Read—Allows view access  Write—Allows view and modify access  None—Prohibits access; the default access is None We can specify access permission for individual users and each group. When you assign a user to a group, that user acquires the group's access permissions. If an individual's access permissions conflict with those of a group the user belongs to, user access permissions take precedence. To enable access permissions for dimensions:  Select Administration > Dimensions.  For Dimension, select the dimension to change.  Click Edit.  In Dimension Properties, select Apply Security to allow access permissions to be set on its members. If you do not select this option, there is no security on the dimension, and users can access its members without restriction.  Click Save. Click Refresh to revert to the previous values. To assign access to members:  Select Administration > Dimensions.  For Dimension, select the dimension to assign access to its members.  Select the member for which to assign access.  Click Assign Access.  Add, change, or remove access. To assign access permissions to members:  Select Administration > Dimensions.  For Dimension, select the dimension for whose member you want to add access.  Click Assign Access.  Click Add Access  Optional: To migrate a user or group's changed identity or their position in the user directory from User Management Console to Planning, click Migrate Identities  Optional: To remove deprovisioned or deleted users or groups from the Planning database to conserve space, click Remove Non-provisioned Users/Groups  For Users and Groups on Add Access, select the users and groups to access the selected member.  For the selected member, select the access type.  Optional: Select a relationship.
  • 3. For example, select Children to assign access to the children of the selected member.  Click Add.  Click Close. To modify access permissions for members:  Select Administration > Dimensions.  For Dimension, select the dimension for whose member you want to edit access.  Click Assign Access.  Optional: To migrate a user or group's changed identity or their position in the user directory from User Management Console to Planning, click Migrate Identities.  Optional: To remove deprovisioned or deleted users or groups from the Planning database to conserve space, click Remove Non-provisioned Users/Groups.  Click Edit Access.  For the selected member on Edit Access, select the access type for the displayed users or groups.  Optional: Select a relationship. For example, select Children to assign access to children of the selected member.  Click Set.  Click Close. To remove access permissions for members:  Select Administration > Dimensions.  For Dimension, select the dimension for whose member you want to remove access.  Click Assign Access.  Select the users and groups for whom to remove access to the selected member.  Click Remove Access.  Click OK.  Click Close. Regards:- AAjjaayy ssiinngghh cchhoouuhhaann