SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Automating Security Management in
PBCS!
Dayalan Punniyamoorthy
Oracle ACE
Practice Manager, Inspirage.
© Copyright 2007-2020 Inspirage. All rights reserved.
2
EPM CLOUD SOLUTIONS
Financial Close and Consolidation
Budgeting and Forecasting
Reporting and Analytics
Profitability and Cost Management
Master Data Management
ERP CLOUD SOLUTIONS
ADVISORY
MANAGED SERVICES
DELIVERING ORACLE EPM & ERP
CLOUD SOLUTIONS GLOBALLY
NOW A PART OF
The Integrated Supply Chain Specialists
© Copyright 2007-2020 Inspirage. All rights reserved.
ORACLE EPM EXPERIENCE
• Oracle® Certified Platinum Partner
• One of the nation’s leading Oracle EPM strategy &
implementation firms
• Successfully implemented Oracle EPM solutions
for dozens of clients in the US, and abroad
• Oracle EPM professional average 15 years of
hands-on experience
• Focused on Fortune 500 companies & large scale,
enterprise-wide implementations
• Deep expertise from process design to technology
implementation
• Proven functional and industry templates to
leverage best practices
• Hyperion Essbase, Planning and HFM certified
professionals
3
Enterprise
Planning
Business
Intelligence
Reporting and
Analytics
Financial
Consolidation
© Copyright 2007-2020 Inspirage. All rights reserved.
4
The Session will address the following points:
• Introduction to Security in Oracle Planning and Budgeting
Cloud
• What are the artifacts/granular level that can have security
in PBC?
• What are the best practices for addressing security?
• How can you mass update security using EPM Automate,
REST API, Groovy, LCM, etc
• Demo
• Q&A
AGENDA
© Copyright 2007-2020 Inspirage. All rights reserved.
5
SECURITY IN PBC
Identity Domain Administrators create and manage Oracle
Enterprise Performance Management Cloud users. While users
are shared across test and production environments, they are
provisioned separately for each environments
Users
• Each user who needs to access an environment must have an
account in the identity domain associated with the environment.
Groups
• Comprising identity domain users or other groups. Assigning roles
to such groups enables Service Administrators to grant roles to
many users at once, thereby reducing administrative overheads.
You can no longer use
Access Control to
import group
information from a file
to create groups.
Similarly you cannot
export group
information using
Access Control. You
may use Migration or
EPM Automate
commands to export
and import groups.
© Copyright 2007-2020 Inspirage. All rights reserved.
6
Roles
Roles link users to the business activities that they are
permitted to perform within an environment and the data
that they can access.
Predefined Roles
• Service Administrator
• Power User
• User
• Viewer
SECURITY IN PBC
© Copyright 2007-2020 Inspirage. All rights reserved.
• Access Control enables you to complete these
activities in an environment:
• Managing Groups
• Assigning Roles to a Group or a User
• Generating a Role Assignment Report for a User or
Group
• Generating the Role Assignment Report For Your
Environment
• Viewing the User Login Report
• No utilities (e.g. importsecurity/exportsecurity)
we have in On-Premises version
ACCESS CONTROL
7
© Copyright 2007-2020 Inspirage. All rights reserved.
8
ACCESS CONTROL
© Copyright 2007-2020 Inspirage. All rights reserved.
 Dimensions, including user-defined dimensions
 Launch privileges to rules
 Rule folders
 Forms
 Dashboards
 Infolets
 Reports, Books, and Bursting Definitions
 Form folders
 Dashboard folders
 Infolet folders
 Reports and Documents folders
 Task lists
 Groovy templates
9
APPLICATION ARTIFACTS THAT CAN BE
ASSIGNED PERMISSIONS
© Copyright 2007-2020 Inspirage. All rights reserved.
Valid intersections are cell interactions which are filtered based on rules you define, called valid intersection rules,
which filter certain cell intersections to users when they enter data or select runtime prompts.
For example, you can specify that certain programs are valid only for some periods or departments.
After valid intersections are defined, cells containing invalid data are read-only. This restriction speeds the
planning process and optimizes the information available to users.
VALID INTERSECTIONS
10
© Copyright 2007-2020 Inspirage. All rights reserved.
Service Administrators applying cell-level security can deny access to cells that a user would normally have access to
due to their regular security. Cell-level security is therefore defined as an exception to the existing member security
Cell-level security uses rules, similar to valid intersection rules, to deny read or write access to users viewing certain
cell intersections anywhere a cell is shown (for example, forms, runtime prompts, Smart View, reports, dashboards,
infolets, and so on).
When cell-level security rules are applied, users with read access can see the data value in a cell but the cell is
not editable. If users are denied read access to a cell, the value displayed in the cell is #noaccess.
Service Administrator, an define and assign cell-level security rules to any user or group. It doesn't affect Service
Administrator.
CELL-LEVEL SECURITY
11
© Copyright 2007-2020 Inspirage. All rights reserved.
12
ACCESS PRECEDENCE
NONE Access
WRITTE Access
READ Access
GROUP Access
Highest
PREDENCE
Lowest
USER Access
© Copyright 2007-2020 Inspirage. All rights reserved.
13
ACCESS
CONTROL
REPORTS
Report that shows
which Groups have
access to which
Dimensions and the
specific values within
those Dimensions.
© Copyright 2007-2020 Inspirage. All rights reserved.
14
OPTIONS TO ADDRESS SECURITY IN BULK?
LCM (Migration)
Users
Groups
Roles
Users.xml contains all entries for user specific access
Under Groups folder, each <groupname>.xml is specific to that group
© Copyright 2007-2020 Inspirage. All rights reserved.
15
OPTIONS TO
ADDRESS SECURITY
IN BULK?
LCM
© Copyright 2007-2020 Inspirage. All rights reserved.
16
EPM Automate
OPTIONS TO ADDRESS SECURITY IN BULK?
© Copyright 2007-2020 Inspirage. All rights reserved.
17
EPM Automate
OPTIONS TO ADDRESS SECURITY IN BULK?
 addUsers
epmautomate addUsers FILE_NAME
userPassword=PASSWORD
resetPassword=true|false
 addUsersToGroup
epmautomate addUsersToGroup user_file.CSV
example_group
 assignRole
epmautomate assignRole FILE_NAME
 importAppSecurity
epmautomate importAppSecurity Acl_file.CSV
Acl_import_error.CSV clearall=true
 removeUsers
epmautomate removeUsers Remove_Users.CSV
 removeUsersFromGroup
epmautomate removeUsersFromTeam
example_users.csv example_team
© Copyright 2007-2020 Inspirage. All rights reserved.
18
REST API Resource view
OPTIONS TO ADDRESS
SECURITY IN BULK?
© Copyright 2007-2020 Inspirage. All rights reserved.
19
REST API Resource view
OPTIONS TO ADDRESS
SECURITY IN BULK?
© Copyright 2007-2020 Inspirage. All rights reserved.
BRINGING THE MAGIC
20 © Copyright 2007-2020 Inspirage. All rights reserved.
© Copyright 2007-2020 Inspirage. All rights reserved.
21
OPTIONS TO ADDRESS
SECURITY IN BULK?
//1.
//addUsersToGroup("addUsersToGrpCapEx.csv", "Accounts_CapEx"); //PUT
//2.
//removeUsersFromGroup("addUsersToGrpCapEx.csv", "Accounts_CapEx"); //PUT
//3.
//assignUsersRoles("assignUsersRoles.csv", "Mass Allocation"); //PUT
//4.
//assignUsersRoles("assignUsersRoles.csv", "Drill Through"); //PUT
//5.
//unassignUsersRoles("assignUsersRoles.csv", "Mass Allocation"); //PUT
//6.
//generateUserGroupReport("UserGroupReport6.csv")
//7.
//generateRoleAssignmentReport("RoleAssignmentReport6.csv");
© Copyright 2007-2020 Inspirage. All rights reserved.
© Copyright 2007-2020 Inspirage. All rights reserved.
Q&A
22
DEMOEMO
© Copyright 2007-2020 Inspirage. All rights reserved.
© Copyright 2007-2020 Inspirage. All rights reserved.
Q&A
23
CONCLUSION
Massupdateoptions
Massupdateoptions
Massupdateoptions
Massupdateoptions
 LCM
LCM
LCM
LCM
 EPM
EPM
EPM
EPMAutomate
Automate
Automate
Automate
 RESTAPI
RESTAPI
RESTAPI
RESTAPI
 Groovy(RESTAPI)
Groovy(RESTAPI)
Groovy(RESTAPI)
Groovy(RESTAPI)
© Copyright 2007-2020 Inspirage. All rights reserved.
www.inspirage.com
Dayalan Punniyamoorthy
@pdayalan www.linkedin.com/in/dayalanpunniyamoorthy/
Personal Blog: https://onlyhyperion.blogspot.com/

Contenu connexe

Tendances

SAP BPC 10.1 NW Master Data loading
SAP BPC 10.1 NW Master Data loading SAP BPC 10.1 NW Master Data loading
SAP BPC 10.1 NW Master Data loading
Manoj Kumar
 
KSCope 2013 - Balance Sheet Reporting - Design Consideration - KSCope Format
KSCope 2013 - Balance Sheet Reporting - Design Consideration - KSCope FormatKSCope 2013 - Balance Sheet Reporting - Design Consideration - KSCope Format
KSCope 2013 - Balance Sheet Reporting - Design Consideration - KSCope Format
Alexandre SERAN
 

Tendances (20)

Oracle FCCS Getting Started Guide II
Oracle FCCS Getting Started Guide IIOracle FCCS Getting Started Guide II
Oracle FCCS Getting Started Guide II
 
Planning learn step by step
Planning learn step by stepPlanning learn step by step
Planning learn step by step
 
HFM-Implementation
HFM-ImplementationHFM-Implementation
HFM-Implementation
 
S4 HANA Finance Contents
S4 HANA Finance Contents S4 HANA Finance Contents
S4 HANA Finance Contents
 
The Future of Business Planning with BPC 10.1 and SAP HANA
The Future of Business Planning with BPC 10.1 and SAP  HANAThe Future of Business Planning with BPC 10.1 and SAP  HANA
The Future of Business Planning with BPC 10.1 and SAP HANA
 
EPBCS - A New Approach to Planning Implementations
EPBCS - A New Approach to Planning ImplementationsEPBCS - A New Approach to Planning Implementations
EPBCS - A New Approach to Planning Implementations
 
Oracle FCCS: A Deep Dive
Oracle FCCS: A Deep DiveOracle FCCS: A Deep Dive
Oracle FCCS: A Deep Dive
 
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
Learn how to use Maximo HSE to Add a Layer of Control on Top of your Work Pro...
 
Rise with SAP
Rise with SAPRise with SAP
Rise with SAP
 
Integration with Group Reporting Preparation Ledger.pdf
Integration with Group Reporting Preparation Ledger.pdfIntegration with Group Reporting Preparation Ledger.pdf
Integration with Group Reporting Preparation Ledger.pdf
 
SAP BPC 10.1 NW Master Data loading
SAP BPC 10.1 NW Master Data loading SAP BPC 10.1 NW Master Data loading
SAP BPC 10.1 NW Master Data loading
 
Oracle hyperion financial management
Oracle hyperion financial managementOracle hyperion financial management
Oracle hyperion financial management
 
Overview profitability and cost management cloud services
Overview profitability and cost management cloud servicesOverview profitability and cost management cloud services
Overview profitability and cost management cloud services
 
KSCope 2013 - Balance Sheet Reporting - Design Consideration - KSCope Format
KSCope 2013 - Balance Sheet Reporting - Design Consideration - KSCope FormatKSCope 2013 - Balance Sheet Reporting - Design Consideration - KSCope Format
KSCope 2013 - Balance Sheet Reporting - Design Consideration - KSCope Format
 
Transition to SAP S/4HANA System Conversion: A step-by-step guide
Transition to SAP S/4HANA System Conversion: A step-by-step guide Transition to SAP S/4HANA System Conversion: A step-by-step guide
Transition to SAP S/4HANA System Conversion: A step-by-step guide
 
SAP Overview for Managers
SAP Overview for ManagersSAP Overview for Managers
SAP Overview for Managers
 
Dimensionality & Dimensions of Hyperion Planning
Dimensionality & Dimensions of Hyperion PlanningDimensionality & Dimensions of Hyperion Planning
Dimensionality & Dimensions of Hyperion Planning
 
Keys to the Kingdom: Key Concepts to ARCS Application Design
Keys to the Kingdom:  Key Concepts to ARCS Application DesignKeys to the Kingdom:  Key Concepts to ARCS Application Design
Keys to the Kingdom: Key Concepts to ARCS Application Design
 
Currency Translation in HFM
Currency Translation in HFMCurrency Translation in HFM
Currency Translation in HFM
 
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examples
 

Similaire à Automating Security Management in PBCS!

FLS_EA_Checklist_AppName_v5.pptx
FLS_EA_Checklist_AppName_v5.pptxFLS_EA_Checklist_AppName_v5.pptx
FLS_EA_Checklist_AppName_v5.pptx
ssuser7b9cdf
 

Similaire à Automating Security Management in PBCS! (20)

ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
Omc for oracle_ebs_demo_script
Omc for oracle_ebs_demo_scriptOmc for oracle_ebs_demo_script
Omc for oracle_ebs_demo_script
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditor
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners Guide
 
Automation Hub Best Practices - Large Scale Rollouts.pdf
Automation Hub Best Practices - Large Scale Rollouts.pdfAutomation Hub Best Practices - Large Scale Rollouts.pdf
Automation Hub Best Practices - Large Scale Rollouts.pdf
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
Contract management security and administration best practices - Oracle Prima...
Contract management security and administration best practices - Oracle Prima...Contract management security and administration best practices - Oracle Prima...
Contract management security and administration best practices - Oracle Prima...
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
 
MySQL: Create multiple DB accounts for an app using SYSTEM_USER privilege and...
MySQL: Create multiple DB accounts for an app using SYSTEM_USER privilege and...MySQL: Create multiple DB accounts for an app using SYSTEM_USER privilege and...
MySQL: Create multiple DB accounts for an app using SYSTEM_USER privilege and...
 
Upwork presentaion in distributed systems
Upwork presentaion in distributed systemsUpwork presentaion in distributed systems
Upwork presentaion in distributed systems
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphs
 
Web–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsWeb–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive Graphs
 
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Machine Learning to Turbo-Charge the Ops Portion of DevOpsMachine Learning to Turbo-Charge the Ops Portion of DevOps
Machine Learning to Turbo-Charge the Ops Portion of DevOps
 
FLS_EA_Checklist_AppName_v5.pptx
FLS_EA_Checklist_AppName_v5.pptxFLS_EA_Checklist_AppName_v5.pptx
FLS_EA_Checklist_AppName_v5.pptx
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 

Dernier

Dernier (14)

Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdfMicrosoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
 
2024-05-15-Surat Meetup-Hyperautomation.pptx
2024-05-15-Surat Meetup-Hyperautomation.pptx2024-05-15-Surat Meetup-Hyperautomation.pptx
2024-05-15-Surat Meetup-Hyperautomation.pptx
 
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdfACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
 
DAY 0 8 A Revelation 05-19-2024 PPT.pptx
DAY 0 8 A Revelation 05-19-2024 PPT.pptxDAY 0 8 A Revelation 05-19-2024 PPT.pptx
DAY 0 8 A Revelation 05-19-2024 PPT.pptx
 
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docxThe Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
The Influence and Evolution of Mogul Press in Contemporary Public Relations.docx
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf
 
Databricks Machine Learning Associate Exam Dumps 2024.pdf
Databricks Machine Learning Associate Exam Dumps 2024.pdfDatabricks Machine Learning Associate Exam Dumps 2024.pdf
Databricks Machine Learning Associate Exam Dumps 2024.pdf
 
Deciding The Topic of our Magazine.pptx.
Deciding The Topic of our Magazine.pptx.Deciding The Topic of our Magazine.pptx.
Deciding The Topic of our Magazine.pptx.
 
TSM unit 5 Toxicokinetics seminar by Ansari Aashif Raza.pptx
TSM unit 5 Toxicokinetics seminar by  Ansari Aashif Raza.pptxTSM unit 5 Toxicokinetics seminar by  Ansari Aashif Raza.pptx
TSM unit 5 Toxicokinetics seminar by Ansari Aashif Raza.pptx
 
Understanding Poverty: A Community Questionnaire
Understanding Poverty: A Community QuestionnaireUnderstanding Poverty: A Community Questionnaire
Understanding Poverty: A Community Questionnaire
 
STM valmiusseminaari 26-04-2024 PUUMALAINEN Ajankohtaista kansainvälisestä yh...
STM valmiusseminaari 26-04-2024 PUUMALAINEN Ajankohtaista kansainvälisestä yh...STM valmiusseminaari 26-04-2024 PUUMALAINEN Ajankohtaista kansainvälisestä yh...
STM valmiusseminaari 26-04-2024 PUUMALAINEN Ajankohtaista kansainvälisestä yh...
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...
 
SaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of GuruSaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of Guru
 
ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024
 

Automating Security Management in PBCS!

  • 1. Automating Security Management in PBCS! Dayalan Punniyamoorthy Oracle ACE Practice Manager, Inspirage.
  • 2. © Copyright 2007-2020 Inspirage. All rights reserved. 2 EPM CLOUD SOLUTIONS Financial Close and Consolidation Budgeting and Forecasting Reporting and Analytics Profitability and Cost Management Master Data Management ERP CLOUD SOLUTIONS ADVISORY MANAGED SERVICES DELIVERING ORACLE EPM & ERP CLOUD SOLUTIONS GLOBALLY NOW A PART OF The Integrated Supply Chain Specialists
  • 3. © Copyright 2007-2020 Inspirage. All rights reserved. ORACLE EPM EXPERIENCE • Oracle® Certified Platinum Partner • One of the nation’s leading Oracle EPM strategy & implementation firms • Successfully implemented Oracle EPM solutions for dozens of clients in the US, and abroad • Oracle EPM professional average 15 years of hands-on experience • Focused on Fortune 500 companies & large scale, enterprise-wide implementations • Deep expertise from process design to technology implementation • Proven functional and industry templates to leverage best practices • Hyperion Essbase, Planning and HFM certified professionals 3 Enterprise Planning Business Intelligence Reporting and Analytics Financial Consolidation
  • 4. © Copyright 2007-2020 Inspirage. All rights reserved. 4 The Session will address the following points: • Introduction to Security in Oracle Planning and Budgeting Cloud • What are the artifacts/granular level that can have security in PBC? • What are the best practices for addressing security? • How can you mass update security using EPM Automate, REST API, Groovy, LCM, etc • Demo • Q&A AGENDA
  • 5. © Copyright 2007-2020 Inspirage. All rights reserved. 5 SECURITY IN PBC Identity Domain Administrators create and manage Oracle Enterprise Performance Management Cloud users. While users are shared across test and production environments, they are provisioned separately for each environments Users • Each user who needs to access an environment must have an account in the identity domain associated with the environment. Groups • Comprising identity domain users or other groups. Assigning roles to such groups enables Service Administrators to grant roles to many users at once, thereby reducing administrative overheads. You can no longer use Access Control to import group information from a file to create groups. Similarly you cannot export group information using Access Control. You may use Migration or EPM Automate commands to export and import groups.
  • 6. © Copyright 2007-2020 Inspirage. All rights reserved. 6 Roles Roles link users to the business activities that they are permitted to perform within an environment and the data that they can access. Predefined Roles • Service Administrator • Power User • User • Viewer SECURITY IN PBC
  • 7. © Copyright 2007-2020 Inspirage. All rights reserved. • Access Control enables you to complete these activities in an environment: • Managing Groups • Assigning Roles to a Group or a User • Generating a Role Assignment Report for a User or Group • Generating the Role Assignment Report For Your Environment • Viewing the User Login Report • No utilities (e.g. importsecurity/exportsecurity) we have in On-Premises version ACCESS CONTROL 7
  • 8. © Copyright 2007-2020 Inspirage. All rights reserved. 8 ACCESS CONTROL
  • 9. © Copyright 2007-2020 Inspirage. All rights reserved.  Dimensions, including user-defined dimensions  Launch privileges to rules  Rule folders  Forms  Dashboards  Infolets  Reports, Books, and Bursting Definitions  Form folders  Dashboard folders  Infolet folders  Reports and Documents folders  Task lists  Groovy templates 9 APPLICATION ARTIFACTS THAT CAN BE ASSIGNED PERMISSIONS
  • 10. © Copyright 2007-2020 Inspirage. All rights reserved. Valid intersections are cell interactions which are filtered based on rules you define, called valid intersection rules, which filter certain cell intersections to users when they enter data or select runtime prompts. For example, you can specify that certain programs are valid only for some periods or departments. After valid intersections are defined, cells containing invalid data are read-only. This restriction speeds the planning process and optimizes the information available to users. VALID INTERSECTIONS 10
  • 11. © Copyright 2007-2020 Inspirage. All rights reserved. Service Administrators applying cell-level security can deny access to cells that a user would normally have access to due to their regular security. Cell-level security is therefore defined as an exception to the existing member security Cell-level security uses rules, similar to valid intersection rules, to deny read or write access to users viewing certain cell intersections anywhere a cell is shown (for example, forms, runtime prompts, Smart View, reports, dashboards, infolets, and so on). When cell-level security rules are applied, users with read access can see the data value in a cell but the cell is not editable. If users are denied read access to a cell, the value displayed in the cell is #noaccess. Service Administrator, an define and assign cell-level security rules to any user or group. It doesn't affect Service Administrator. CELL-LEVEL SECURITY 11
  • 12. © Copyright 2007-2020 Inspirage. All rights reserved. 12 ACCESS PRECEDENCE NONE Access WRITTE Access READ Access GROUP Access Highest PREDENCE Lowest USER Access
  • 13. © Copyright 2007-2020 Inspirage. All rights reserved. 13 ACCESS CONTROL REPORTS Report that shows which Groups have access to which Dimensions and the specific values within those Dimensions.
  • 14. © Copyright 2007-2020 Inspirage. All rights reserved. 14 OPTIONS TO ADDRESS SECURITY IN BULK? LCM (Migration) Users Groups Roles Users.xml contains all entries for user specific access Under Groups folder, each <groupname>.xml is specific to that group
  • 15. © Copyright 2007-2020 Inspirage. All rights reserved. 15 OPTIONS TO ADDRESS SECURITY IN BULK? LCM
  • 16. © Copyright 2007-2020 Inspirage. All rights reserved. 16 EPM Automate OPTIONS TO ADDRESS SECURITY IN BULK?
  • 17. © Copyright 2007-2020 Inspirage. All rights reserved. 17 EPM Automate OPTIONS TO ADDRESS SECURITY IN BULK?  addUsers epmautomate addUsers FILE_NAME userPassword=PASSWORD resetPassword=true|false  addUsersToGroup epmautomate addUsersToGroup user_file.CSV example_group  assignRole epmautomate assignRole FILE_NAME  importAppSecurity epmautomate importAppSecurity Acl_file.CSV Acl_import_error.CSV clearall=true  removeUsers epmautomate removeUsers Remove_Users.CSV  removeUsersFromGroup epmautomate removeUsersFromTeam example_users.csv example_team
  • 18. © Copyright 2007-2020 Inspirage. All rights reserved. 18 REST API Resource view OPTIONS TO ADDRESS SECURITY IN BULK?
  • 19. © Copyright 2007-2020 Inspirage. All rights reserved. 19 REST API Resource view OPTIONS TO ADDRESS SECURITY IN BULK?
  • 20. © Copyright 2007-2020 Inspirage. All rights reserved. BRINGING THE MAGIC 20 © Copyright 2007-2020 Inspirage. All rights reserved.
  • 21. © Copyright 2007-2020 Inspirage. All rights reserved. 21 OPTIONS TO ADDRESS SECURITY IN BULK? //1. //addUsersToGroup("addUsersToGrpCapEx.csv", "Accounts_CapEx"); //PUT //2. //removeUsersFromGroup("addUsersToGrpCapEx.csv", "Accounts_CapEx"); //PUT //3. //assignUsersRoles("assignUsersRoles.csv", "Mass Allocation"); //PUT //4. //assignUsersRoles("assignUsersRoles.csv", "Drill Through"); //PUT //5. //unassignUsersRoles("assignUsersRoles.csv", "Mass Allocation"); //PUT //6. //generateUserGroupReport("UserGroupReport6.csv") //7. //generateRoleAssignmentReport("RoleAssignmentReport6.csv");
  • 22. © Copyright 2007-2020 Inspirage. All rights reserved. © Copyright 2007-2020 Inspirage. All rights reserved. Q&A 22 DEMOEMO
  • 23. © Copyright 2007-2020 Inspirage. All rights reserved. © Copyright 2007-2020 Inspirage. All rights reserved. Q&A 23 CONCLUSION Massupdateoptions Massupdateoptions Massupdateoptions Massupdateoptions  LCM LCM LCM LCM  EPM EPM EPM EPMAutomate Automate Automate Automate  RESTAPI RESTAPI RESTAPI RESTAPI  Groovy(RESTAPI) Groovy(RESTAPI) Groovy(RESTAPI) Groovy(RESTAPI)
  • 24. © Copyright 2007-2020 Inspirage. All rights reserved. www.inspirage.com Dayalan Punniyamoorthy @pdayalan www.linkedin.com/in/dayalanpunniyamoorthy/ Personal Blog: https://onlyhyperion.blogspot.com/