SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Document:
                      “Implementing Security in
      Oracle Hyperion Essbase using Shared Service”


Description:
This document provides an overview of security model of Hyperion Essbase
using Shared Service. It also focuses on cell level security using Essbase filters
and common administrative activities associated to user/group
administrations.




History:
Version                Description          Author                      Publish Date
                       Change
0.1                    Initial Draft        Gaurav Shrivastava          30-Mar-2011
0.1                    Review I             Amit Sharma                 1st April




       ©Business Intelligence Solution Providers | learnhyperion.wordpress.com     1
.




Table of contents
    1)    Introduction
    2)    Launching Shared Service
    3)    Converting Security Mode
    4)    Benefits of externalizing the security:
    5)    Working with Shared Service
              a) Creating Group
              b) Creating User
    6)    Add new Role
    7)    How to create user through maxl?
    8)    Refresh Security from Shared Services
    9)    Apply Provision
    10)   Creating Filter
              a) Read Write Filter
              b) Read Filter
              c) Meta Data Read Filter
              d) Read and No_access Filter
              e) Read Write and No_access
              f) Metadata Read and write filter
              g) Filter on member Combination
              h) Filter on member Combination Separately
    11)   Administration Option
    12)   Configuring User Directories
    13)   Recover Native Directory
    14)   Configure Auditing
    15)   Assign Access Control
    16)    Understanding Roles
              a) Shared Service Roles
              b) Essbase Roles




.




          ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   2
Introduction
   Shared service is a common system for managing user and group access to all oracle Hyperion
products, including Essbase. The database organization, application organization and managing
metadata can perform through shared services. Shared service has folder structure for Hyperion
products, all application, database, artifacts and user directory information. Folder views enable the
administrator to migrate an entire folder structure or a portion of a folder structure easily using Shared
Services. You can perform migration through shared service.

Launching Shared Service
You can launch shared services through below URL.
http://<server>:28080/interop/
Click Launch Application




Pass the credential ….




  This is the shared service console by you can manage all Hyperion products. You can perform all
administration tasks through this console such as user creation, user deletion, assigning roles managing

        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                  3
groups etc. All application manages through folder structure and allow administrator to migrate an
entire folder structure or a portion of a folder structure easily using Shared Services.




Shared Services integrates the products to provide these functionalities:
   1. User provisioning
   2. External authentication definition
   3. Task flow management

The Shared Services server components:
    1. Databases (relational and OpenLDAP)
    2. Web application server
    3. User Management Console

Converting Security Mode: The default Essbase security mode is 'internal security' model. In this
model, we see Essbase creating users, managing their passwords, and their access all within the Essbase
product. Essbase uses Essbase.sec file to store security information locally in Essbase. It is therefore
possible to have an Essbase server not manage roles and access via Shared Services, but that option is
becoming increasingly uncommon. Its main use is for legacy Essbase servers to 'migrate' users from
their legacy versions into the System 11 world of Shared Services.
Alternatively we can externalize the security and let Shared Service manage the security for Essbase.

Benefits of externalizing the security:
            1) Backup/Restore Security: Provisioning information from Shared Services can be easily
               exported to XML using the utility that is packaged with Shared Services. This file
               contains all information about the LDAP users, groups, and provisioning. This same file
               could be used to import the provisioning in the event of a disaster recovery, file
               corruption or server upgrade
            2) Automatic Refresh / Synchronization: SHAREDSERVICESREFRESHINTERVAL setting in
               the Essbase.cfg file can establish an interval for periodic refreshes from Shared Services
               to Essbase. This setting is in number of minutes. To refresh every 30 minutes, the setting
               would be SHAREDSERVICESREFRESHINTERVAL 30
            3) Limited Admin Activities: Essbase Administration tasks confined to creation of Filters,
               Calculations, Load Rules, and Substitution Variables continue to be performed in the
               Essbase.

        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                 4
4) Reduced Administration: User/Group administration can be pushed to LDAP from
                Essbase ‘internal security’ Thus, when a new user is to be added he or she will
                automatically get the proper Essbase security simply through the corporate security
                administrator establishing the user's id in the appropriate LDAP group.

Right click on security and select externalize users.




Click for conformation




Don’t change default conversion settings click ok.




Success message of convert security mode
        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com            5
Working with Shared Service

Creating Group
Right click on “Groups” and select “New”




Give group name and insert description about group then click next.




Select group members……
Assign group member….click next…..




       ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   6
Assign user members for this new group……
Click finish




Success message




For validating new group go to the group native directory……




Creating User
Open shared service expend user directories then native directory.
Right click on user and click new




Insert user information and click next




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   7
Assign user to the group. Click finish




Success message




User created successfully, open user native directory for validation.




Add new Role
These are the available roles in shared services. You also can add new role through shared services.




Right click and click new role.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                  8
How to create user through Maxl?
You can create new user through Maxl script by following command.




Provide access rights to new user by following command.




 Verify that access rights correctly assign to the user. When you login with the same user it will show
only “Bisp” application.




       ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                 9
Refresh Security from Shared Services
When you make changes in to shared service you have to refresh shared service security. Open Essbase
Right click on security select “Refresh security from shared services”.




If you made changes for current user select current user else select refresh security for all users.
Click ok…




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                        10
Conform and click yes…




Success massage




Apply Provision
Through shared service you can apply provision to particular user. Right click on user




Select desired roles from the available roles and save the changes.[List of roles are given in appendix]




You can validate that “ram1” can access only “Bisp” and “Sample” application.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                    11
1) Create user “Tom” through shared services Right click on user and assign the role to “Tom”.




Now log off from the existing user and login through new user “Tom”.




You can verify through right click on “Bisp” application and find that “Tom” is not administrator so that
some options are disable.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                  12
Open users you can view the existing users but when you click on “Tom” or any other user only those
rights will enable for which “Tom” has access rights.




Creating Filter [Cell Level Security]
 You create filter through Maxl script and assign access right to any user. You can also create filter for
the specific condition. The task flow will be first create filter, assign access rights to the user then login
with the user and check filter is working.

1.Read Write Filter
Open Maxl script and write script for creating filter for give Read Write access.
Click ok….




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                      13
Press enter…




Command for granting access right to the user “ORG”.
Click on Execute button……..




You can verify that user “ORG” has access rights to write on “Budget” through lock and send method.




       ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                14
Data is loaded successfully.

Again load data in actual field through lock and send method.




When you update data in actual field and then try to lock it Essbase throw the below error.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com               15
2. Read Filter
Read only filter for the specify area. This filter is to restrict user for write in to database but user can
read “New York”. You have to write Maxl script to create filter and grant filter to the user.




Connect to “BispBD” database and try to update or write on “New York” data through lock and send
method. Essbase will throw the below message.




  3.      Meta Data Read Filter
This filter is to restrict user to access all cube data. User can access data for which he has access rights.
Through Maxl Script you can apply filter for metadata read only. Create new maxl script write command
for metadata read shown below then grant filter to any user.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                     16
Login by user “ORG”




You can verify that “ORG” user should not access data other then “New York”.




3. Read and No_access Filter
Filter on user define attributes.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   17
UDAs in outline of cube




Execute the Maxl script and see the impact on excel login through the user.




    4. Read Write and No_access
Create filter for providing read, write and no_access to the user “ORG”.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   18
Verification of read access




Verification of write access




Database is modified.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   19
Verification of no_access




5. Metadata Read and write filter
Filter for assign metadata.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   20
Assigning filter to the user through console Double click on user “ORG”…..




This is the user information select “App/Db Access” tab.




Open application databases then assign filter to the user and click apply.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   21
Login with ORG user and then try to access market. Only “East” data is visual to the user.




User also has update write, So update any value through lock and send method.




To verify that data get updated or not “Retrieve” and check updated cell.



        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com              22
6. Filter on member Combination
 You can also create filters on various combination of members. This is the filter for giving read access to
the user only for combination of product “100-10” and “New York”.




Below Maxl script for creating filter and assign to the user.




You can see in to outline the alias for “100-10” is cola.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                    23
Login with “ORG” user and see the impact of filter on cube.




7. Filter on member Combination Separately
You can also write filer on the separate bases as shown in below Maxl script.




You can access complete data which has either “Cola” or “New York”.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   24
Administration Option




       ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   25
©Business Intelligence Solution Providers | learnhyperion.wordpress.com   26
Configuring User Directories
You can configure user directory if it is required.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   27
Native directory is already configure though there is option to edit provider configuration.




Make changes and click finish.




Recover Native Directory
You also can recover native directory if something goes wrong.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                28
Click on start recovery




Native directory recovered successfully.




This is the Log information of native dirctory.




You can change or configure native directory password.




Panel for changing password.




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   29
Configure Auditing




       ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   30
©Business Intelligence Solution Providers | learnhyperion.wordpress.com   31
Assign Access Control to Essbase Cube
Open shared service expend application group expend essbase server node Right click on application
and select “Assign Access Control”.




Select user from the available user then click next.




Select database




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com           32
Apply filter and calculation script




Select at least one user and click on Right check mark to validate settings.




Save the changes




        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com   33
Understanding Roles
Shared Services Roles
Administrator: is the power user. He can invoke shared services and perform administration tasks for all
Hyperion products. Shared service components are
Administrator Provides control over all products that integrate with Shared Services. It enables more
control over security than any other Hyperion product roles. Administrators can perform all
administrative tasks in User Management Console and can provision themselves. This role grants broad
access to all applications registered with Shared Services. The Administrator role is, by default, assigned
to the admin Native Directory user, which is the only user available after you deploy Shared Services.




Directory Manager: Creates and manages users and groups within Native Directory.
Do not assign to Directory Managers the Provisioning Manager role because combining these roles
allows Directory Managers to provision themselves. The recommended practice is to grant one user the
Directory Manager role and another user the Provisioning Manager role.
LCM Manager Runs the Artifact Life-Cycle Management utility to promote artifacts or data across
product environments and operating systems. LCM utility also use for migrate application on the same
environment or different environment.

Project Manager Users who are assigned the Project Manager role can create and manage projects
within Shared Services


        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                   34
Create Integrations Creates Shared Services data integrations (the process of moving data between
applications) using a wizard. For Oracle's Enterprise Performance Management Architect, creates and
executes data synchronizations.
Run Integrations Views and runs Shared Services data integrations. For Performance Management
Architect, executes data synchronizations.
Dimension Editor Creates and manages import profiles for dimension creation. Also, creates and
manages dimensions manually within the Performance Management Architect user interface or the
Classic Application Administration option. Required to access Classic Application Administration options
for Financial Management and Planning using Web navigation.

Application Creator Creates and deploys Performance Management Architect applications. Users with
this role can create applications, but can change only the dimensions to which they have access
permissions. Required, in addition to the Dimension Editor role, for Financial Management and planning
users to be able to Navigate to their product’s Classic Application Administration options. When a user
with Application Creator role deploys an application from Performance Management Architect, that
user automatically becomes the application administrator and provisioning manager for that
application. The Application Creator can create all applications.

Analytic Services Application Creator: The Analytic Services Application Creator can create Generic
Performance Management Architect applications.
Financial Management Application Creator: The Financial Management Application Creator can create
Consolidation applications and Performance Management Architect Generic applications. To create
applications, the user must also be a member of the Application Creators group specified in Financial
Management Configuration Utility.

Planning Application Creator: The Planning Application Creator can create Planning applications and
Performance Management Architect Generic applications.

Essbase Roles
Power Roles
Administrator Grants full access to administer the server, applications and databases
Application Manager Creates deletes and modifies databases, and application settings within the
assigned application. Includes Database Manager Permissions for the databases within the assigned
application
Create/Delete Application Creates and deletes applications and databases within applications. Includes
Manager Permissions for the applications and databases created by this user
Database Manager Manages the databases, database objects, locks and sessions within the assigned
application Load/Unload Application Start and stops an application or databases.

Interactive Roles
Calc: - Calculates, updates and reads data values based on the assigned scope, using any assigned
calculations and filter
Write: -Updates and reads data values based on the assigned scope, using any assigned filter
Filter: - Accesses specific data and meta data according to the restrictions of a filter

View Roles
Read: - Read data values
Server Access: - Accesses any database that has a default access other than none

        ©Business Intelligence Solution Providers | learnhyperion.wordpress.com                 35
©Business Intelligence Solution Providers | learnhyperion.wordpress.com   36

Weitere ähnliche Inhalte

Was ist angesagt?

Planning learn step by step
Planning learn step by stepPlanning learn step by step
Planning learn step by stepksrajakumar
 
Essbase log files
Essbase log filesEssbase log files
Essbase log filesAmit Sharma
 
Hyperion essbase basics
Hyperion essbase basicsHyperion essbase basics
Hyperion essbase basicsAmit Sharma
 
Essbase ASO and BSO tuning
Essbase ASO and BSO tuningEssbase ASO and BSO tuning
Essbase ASO and BSO tuningsodhiranga
 
Data options with hyperion planning and essbase
Data options with hyperion planning and essbaseData options with hyperion planning and essbase
Data options with hyperion planning and essbasefinitsolutions
 
FDMEE Tutorial - Part 1
FDMEE Tutorial - Part 1FDMEE Tutorial - Part 1
FDMEE Tutorial - Part 1Van Huy
 
Budgeting using hyperion planning vs essbase
Budgeting using hyperion planning vs essbaseBudgeting using hyperion planning vs essbase
Budgeting using hyperion planning vs essbaseSyntelli Solutions
 
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examplesAmit Sharma
 
Finit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEEFinit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEEfinitsolutions
 
Beginning Calculation Manager for Essbase and Hyperion Planning
Beginning Calculation Manager for Essbase and Hyperion Planning Beginning Calculation Manager for Essbase and Hyperion Planning
Beginning Calculation Manager for Essbase and Hyperion Planning Alithya
 
Oracle PBCS creating standard application
Oracle PBCS creating  standard applicationOracle PBCS creating  standard application
Oracle PBCS creating standard applicationAmit Sharma
 
Getting the Most out of EPMA: HFM Managing Metadata with EPMA
Getting the Most out of EPMA: HFM Managing Metadata with EPMAGetting the Most out of EPMA: HFM Managing Metadata with EPMA
Getting the Most out of EPMA: HFM Managing Metadata with EPMAfinitsolutions
 
I Can do WHAT with PCMCS? Features and Functions, Business Benefits, and Use...
I Can do WHAT with PCMCS?  Features and Functions, Business Benefits, and Use...I Can do WHAT with PCMCS?  Features and Functions, Business Benefits, and Use...
I Can do WHAT with PCMCS? Features and Functions, Business Benefits, and Use...Alithya
 
Sydney hyperion financial reporting top 10 tips and tricks 09-20-11
Sydney   hyperion financial reporting top 10 tips and tricks 09-20-11Sydney   hyperion financial reporting top 10 tips and tricks 09-20-11
Sydney hyperion financial reporting top 10 tips and tricks 09-20-11Venkat Ramanareddy
 
No more unknown members! Smart data load validation for Hyperion Planning usi...
No more unknown members! Smart data load validation for Hyperion Planning usi...No more unknown members! Smart data load validation for Hyperion Planning usi...
No more unknown members! Smart data load validation for Hyperion Planning usi...Rodrigo Radtke de Souza
 
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examplesAmit Soni
 

Was ist angesagt? (20)

Planning learn step by step
Planning learn step by stepPlanning learn step by step
Planning learn step by step
 
Essbase log files
Essbase log filesEssbase log files
Essbase log files
 
Hyperion essbase basics
Hyperion essbase basicsHyperion essbase basics
Hyperion essbase basics
 
Essbase ASO and BSO tuning
Essbase ASO and BSO tuningEssbase ASO and BSO tuning
Essbase ASO and BSO tuning
 
Data options with hyperion planning and essbase
Data options with hyperion planning and essbaseData options with hyperion planning and essbase
Data options with hyperion planning and essbase
 
FDMEE Tutorial - Part 1
FDMEE Tutorial - Part 1FDMEE Tutorial - Part 1
FDMEE Tutorial - Part 1
 
Budgeting using hyperion planning vs essbase
Budgeting using hyperion planning vs essbaseBudgeting using hyperion planning vs essbase
Budgeting using hyperion planning vs essbase
 
Essbase intro
Essbase introEssbase intro
Essbase intro
 
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examples
 
Finit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEEFinit solutions - Automating Data Loads with FDMEE
Finit solutions - Automating Data Loads with FDMEE
 
Beginning Calculation Manager for Essbase and Hyperion Planning
Beginning Calculation Manager for Essbase and Hyperion Planning Beginning Calculation Manager for Essbase and Hyperion Planning
Beginning Calculation Manager for Essbase and Hyperion Planning
 
Essmaxl
EssmaxlEssmaxl
Essmaxl
 
Oracle PBCS creating standard application
Oracle PBCS creating  standard applicationOracle PBCS creating  standard application
Oracle PBCS creating standard application
 
Getting the Most out of EPMA: HFM Managing Metadata with EPMA
Getting the Most out of EPMA: HFM Managing Metadata with EPMAGetting the Most out of EPMA: HFM Managing Metadata with EPMA
Getting the Most out of EPMA: HFM Managing Metadata with EPMA
 
I Can do WHAT with PCMCS? Features and Functions, Business Benefits, and Use...
I Can do WHAT with PCMCS?  Features and Functions, Business Benefits, and Use...I Can do WHAT with PCMCS?  Features and Functions, Business Benefits, and Use...
I Can do WHAT with PCMCS? Features and Functions, Business Benefits, and Use...
 
Sydney hyperion financial reporting top 10 tips and tricks 09-20-11
Sydney   hyperion financial reporting top 10 tips and tricks 09-20-11Sydney   hyperion financial reporting top 10 tips and tricks 09-20-11
Sydney hyperion financial reporting top 10 tips and tricks 09-20-11
 
HFM-Implementation
HFM-ImplementationHFM-Implementation
HFM-Implementation
 
Basics of fdmee
Basics of fdmeeBasics of fdmee
Basics of fdmee
 
No more unknown members! Smart data load validation for Hyperion Planning usi...
No more unknown members! Smart data load validation for Hyperion Planning usi...No more unknown members! Smart data load validation for Hyperion Planning usi...
No more unknown members! Smart data load validation for Hyperion Planning usi...
 
FDMEE script examples
FDMEE script examplesFDMEE script examples
FDMEE script examples
 

Andere mochten auch

Sager CATÁLOGO HOSTELERÍA
Sager CATÁLOGO HOSTELERÍASager CATÁLOGO HOSTELERÍA
Sager CATÁLOGO HOSTELERÍAMarketingSager
 
Introducing Google Nexus 5
Introducing Google Nexus 5Introducing Google Nexus 5
Introducing Google Nexus 5JJ Wu
 
EFFLE TOWER Vs WORLD .ppt
EFFLE TOWER Vs WORLD .pptEFFLE TOWER Vs WORLD .ppt
EFFLE TOWER Vs WORLD .pptYoni S
 
Automobile cruise control
Automobile cruise controlAutomobile cruise control
Automobile cruise controlTanzeel Ahmad
 
Exámenes (casos especiales)
Exámenes (casos especiales)Exámenes (casos especiales)
Exámenes (casos especiales)EugenioFouz
 
Nework diag presentan 013
Nework diag presentan 013Nework diag presentan 013
Nework diag presentan 013Tajudeen Sanni
 
Gincana tabela periódica
Gincana tabela periódicaGincana tabela periódica
Gincana tabela periódicaMaisy Modesto
 
Praktek Kalorimeter Fisika Dasar
Praktek Kalorimeter Fisika DasarPraktek Kalorimeter Fisika Dasar
Praktek Kalorimeter Fisika DasarWidya arsy
 
Picking the Right Node.js Framework for Your Use Case
Picking the Right Node.js Framework for Your Use CasePicking the Right Node.js Framework for Your Use Case
Picking the Right Node.js Framework for Your Use CaseJimmy Guerrero
 
Palestra de Associativismo - Comitê Gestor da LGMPE de Cambará
Palestra de Associativismo - Comitê Gestor da LGMPE de CambaráPalestra de Associativismo - Comitê Gestor da LGMPE de Cambará
Palestra de Associativismo - Comitê Gestor da LGMPE de CambaráPedro Manoel Rosa Domingues Santos
 

Andere mochten auch (20)

Alimentos mayores
Alimentos mayoresAlimentos mayores
Alimentos mayores
 
Sager CATÁLOGO HOSTELERÍA
Sager CATÁLOGO HOSTELERÍASager CATÁLOGO HOSTELERÍA
Sager CATÁLOGO HOSTELERÍA
 
Russian Revolution
Russian RevolutionRussian Revolution
Russian Revolution
 
Introducing Google Nexus 5
Introducing Google Nexus 5Introducing Google Nexus 5
Introducing Google Nexus 5
 
EFFLE TOWER Vs WORLD .ppt
EFFLE TOWER Vs WORLD .pptEFFLE TOWER Vs WORLD .ppt
EFFLE TOWER Vs WORLD .ppt
 
Cenário econômico Africano
Cenário econômico AfricanoCenário econômico Africano
Cenário econômico Africano
 
stare decisis
stare decisisstare decisis
stare decisis
 
Automobile cruise control
Automobile cruise controlAutomobile cruise control
Automobile cruise control
 
Exámenes (casos especiales)
Exámenes (casos especiales)Exámenes (casos especiales)
Exámenes (casos especiales)
 
Nework diag presentan 013
Nework diag presentan 013Nework diag presentan 013
Nework diag presentan 013
 
CSWPA-MT
CSWPA-MTCSWPA-MT
CSWPA-MT
 
Las Cruzadas
Las CruzadasLas Cruzadas
Las Cruzadas
 
Gincana tabela periódica
Gincana tabela periódicaGincana tabela periódica
Gincana tabela periódica
 
Putrefaction pp
Putrefaction ppPutrefaction pp
Putrefaction pp
 
Website monetization
Website monetizationWebsite monetization
Website monetization
 
Praktek Kalorimeter Fisika Dasar
Praktek Kalorimeter Fisika DasarPraktek Kalorimeter Fisika Dasar
Praktek Kalorimeter Fisika Dasar
 
Picking the Right Node.js Framework for Your Use Case
Picking the Right Node.js Framework for Your Use CasePicking the Right Node.js Framework for Your Use Case
Picking the Right Node.js Framework for Your Use Case
 
Palestra de Associativismo - Comitê Gestor da LGMPE de Cambará
Palestra de Associativismo - Comitê Gestor da LGMPE de CambaráPalestra de Associativismo - Comitê Gestor da LGMPE de Cambará
Palestra de Associativismo - Comitê Gestor da LGMPE de Cambará
 
Krishnamraju.g
Krishnamraju.gKrishnamraju.g
Krishnamraju.g
 
Catalogo portaprecios
Catalogo portapreciosCatalogo portaprecios
Catalogo portaprecios
 

Ähnlich wie Essbase security implementation

Essbase security-implementation
Essbase security-implementationEssbase security-implementation
Essbase security-implementationAmit Sharma
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!Dayalan Punniyamoorthy
 
Interview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMInterview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMKumari Warsha Goel
 
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!Dayalan Punniyamoorthy
 
Alfresco : Implementing Membership and Security
Alfresco  : Implementing Membership and Security	Alfresco  : Implementing Membership and Security
Alfresco : Implementing Membership and Security Wildan Maulana
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing onguest648519
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Sangeetha Rangarajan
 
Hyperion LCM Utility
Hyperion LCM UtilityHyperion LCM Utility
Hyperion LCM UtilityAmit Sharma
 
Manage security in Model-app Power App with Common data service
Manage security in Model-app Power App with Common data serviceManage security in Model-app Power App with Common data service
Manage security in Model-app Power App with Common data serviceLearning SharePoint
 
Nwtl2017 extending and customizing ibm connections cloud
Nwtl2017 extending and customizing ibm connections cloudNwtl2017 extending and customizing ibm connections cloud
Nwtl2017 extending and customizing ibm connections cloudAndré Luís Cardoso
 
Introduction to Java Enterprise Edition
Introduction to Java Enterprise EditionIntroduction to Java Enterprise Edition
Introduction to Java Enterprise EditionAbdalla Mahmoud
 
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...Sami JAMMALI
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003rafiq123
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptxMitikuAbebe2
 
Liferay architecture By Navin Agarwal
Liferay architecture By Navin AgarwalLiferay architecture By Navin Agarwal
Liferay architecture By Navin AgarwalNavin Agarwal
 
Oracle Self Service HR Document
Oracle Self Service HR DocumentOracle Self Service HR Document
Oracle Self Service HR DocumentHussain Abbas
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features Cireson
 
MOSS2007 Security
MOSS2007 SecurityMOSS2007 Security
MOSS2007 Securitydropkic
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...IGEEKS TECHNOLOGIES
 

Ähnlich wie Essbase security implementation (20)

Essbase security-implementation
Essbase security-implementationEssbase security-implementation
Essbase security-implementation
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
 
Interview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMInterview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRM
 
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
 
Alfresco : Implementing Membership and Security
Alfresco  : Implementing Membership and Security	Alfresco  : Implementing Membership and Security
Alfresco : Implementing Membership and Security
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing on
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
Hyperion LCM Utility
Hyperion LCM UtilityHyperion LCM Utility
Hyperion LCM Utility
 
Manage security in Model-app Power App with Common data service
Manage security in Model-app Power App with Common data serviceManage security in Model-app Power App with Common data service
Manage security in Model-app Power App with Common data service
 
Nwtl2017 extending and customizing ibm connections cloud
Nwtl2017 extending and customizing ibm connections cloudNwtl2017 extending and customizing ibm connections cloud
Nwtl2017 extending and customizing ibm connections cloud
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
Introduction to Java Enterprise Edition
Introduction to Java Enterprise EditionIntroduction to Java Enterprise Edition
Introduction to Java Enterprise Edition
 
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
Mr20 enus 14-Report Design in Management Reporter 2.0 for Microsoft Dynamics®...
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 
2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx2 Configuring Windows Server 2003.pptx
2 Configuring Windows Server 2003.pptx
 
Liferay architecture By Navin Agarwal
Liferay architecture By Navin AgarwalLiferay architecture By Navin Agarwal
Liferay architecture By Navin Agarwal
 
Oracle Self Service HR Document
Oracle Self Service HR DocumentOracle Self Service HR Document
Oracle Self Service HR Document
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features
 
MOSS2007 Security
MOSS2007 SecurityMOSS2007 Security
MOSS2007 Security
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 

Mehr von Amit Sharma

Oracle enteprise pbcs drivers and assumptions
Oracle enteprise pbcs drivers and assumptionsOracle enteprise pbcs drivers and assumptions
Oracle enteprise pbcs drivers and assumptionsAmit Sharma
 
Oracle EPBCS Driver
Oracle EPBCS Driver Oracle EPBCS Driver
Oracle EPBCS Driver Amit Sharma
 
Oracle Sales Quotation Planning
Oracle Sales Quotation PlanningOracle Sales Quotation Planning
Oracle Sales Quotation PlanningAmit Sharma
 
Oracle strategic workforce planning cloud hcmswp converted
Oracle strategic workforce planning cloud hcmswp convertedOracle strategic workforce planning cloud hcmswp converted
Oracle strategic workforce planning cloud hcmswp convertedAmit Sharma
 
Hfm rule custom consolidation
Hfm rule custom consolidationHfm rule custom consolidation
Hfm rule custom consolidationAmit Sharma
 
Hfm calculating RoA
Hfm calculating RoAHfm calculating RoA
Hfm calculating RoAAmit Sharma
 
Adding metadata using smartview
Adding metadata using smartviewAdding metadata using smartview
Adding metadata using smartviewAmit Sharma
 
Hyperion planning weekly distribution
Hyperion planning weekly distributionHyperion planning weekly distribution
Hyperion planning weekly distributionAmit Sharma
 
Hyperion planning scheduling data import
Hyperion planning scheduling data importHyperion planning scheduling data import
Hyperion planning scheduling data importAmit Sharma
 
Hyperion planning new features
Hyperion planning new featuresHyperion planning new features
Hyperion planning new featuresAmit Sharma
 
Microsoft dynamics crm videos
Microsoft dynamics crm videosMicrosoft dynamics crm videos
Microsoft dynamics crm videosAmit Sharma
 
Oracle apex-hands-on-guide lab#1
Oracle apex-hands-on-guide lab#1Oracle apex-hands-on-guide lab#1
Oracle apex-hands-on-guide lab#1Amit Sharma
 
Oracle apex hands on lab#2
Oracle apex hands on lab#2Oracle apex hands on lab#2
Oracle apex hands on lab#2Amit Sharma
 
Security and-data-access-document
Security and-data-access-documentSecurity and-data-access-document
Security and-data-access-documentAmit Sharma
 
Sales force managing-data
Sales force managing-dataSales force managing-data
Sales force managing-dataAmit Sharma
 
Salesforce interview-preparation-toolkit-formula-and-validation-rules-in-sale...
Salesforce interview-preparation-toolkit-formula-and-validation-rules-in-sale...Salesforce interview-preparation-toolkit-formula-and-validation-rules-in-sale...
Salesforce interview-preparation-toolkit-formula-and-validation-rules-in-sale...Amit Sharma
 
Sales force certification-lab-ii
Sales force certification-lab-iiSales force certification-lab-ii
Sales force certification-lab-iiAmit Sharma
 
Sales force certification-lab
Sales force certification-labSales force certification-lab
Sales force certification-labAmit Sharma
 
Managing users-doc
Managing users-docManaging users-doc
Managing users-docAmit Sharma
 
Force.com migration utility
Force.com migration utilityForce.com migration utility
Force.com migration utilityAmit Sharma
 

Mehr von Amit Sharma (20)

Oracle enteprise pbcs drivers and assumptions
Oracle enteprise pbcs drivers and assumptionsOracle enteprise pbcs drivers and assumptions
Oracle enteprise pbcs drivers and assumptions
 
Oracle EPBCS Driver
Oracle EPBCS Driver Oracle EPBCS Driver
Oracle EPBCS Driver
 
Oracle Sales Quotation Planning
Oracle Sales Quotation PlanningOracle Sales Quotation Planning
Oracle Sales Quotation Planning
 
Oracle strategic workforce planning cloud hcmswp converted
Oracle strategic workforce planning cloud hcmswp convertedOracle strategic workforce planning cloud hcmswp converted
Oracle strategic workforce planning cloud hcmswp converted
 
Hfm rule custom consolidation
Hfm rule custom consolidationHfm rule custom consolidation
Hfm rule custom consolidation
 
Hfm calculating RoA
Hfm calculating RoAHfm calculating RoA
Hfm calculating RoA
 
Adding metadata using smartview
Adding metadata using smartviewAdding metadata using smartview
Adding metadata using smartview
 
Hyperion planning weekly distribution
Hyperion planning weekly distributionHyperion planning weekly distribution
Hyperion planning weekly distribution
 
Hyperion planning scheduling data import
Hyperion planning scheduling data importHyperion planning scheduling data import
Hyperion planning scheduling data import
 
Hyperion planning new features
Hyperion planning new featuresHyperion planning new features
Hyperion planning new features
 
Microsoft dynamics crm videos
Microsoft dynamics crm videosMicrosoft dynamics crm videos
Microsoft dynamics crm videos
 
Oracle apex-hands-on-guide lab#1
Oracle apex-hands-on-guide lab#1Oracle apex-hands-on-guide lab#1
Oracle apex-hands-on-guide lab#1
 
Oracle apex hands on lab#2
Oracle apex hands on lab#2Oracle apex hands on lab#2
Oracle apex hands on lab#2
 
Security and-data-access-document
Security and-data-access-documentSecurity and-data-access-document
Security and-data-access-document
 
Sales force managing-data
Sales force managing-dataSales force managing-data
Sales force managing-data
 
Salesforce interview-preparation-toolkit-formula-and-validation-rules-in-sale...
Salesforce interview-preparation-toolkit-formula-and-validation-rules-in-sale...Salesforce interview-preparation-toolkit-formula-and-validation-rules-in-sale...
Salesforce interview-preparation-toolkit-formula-and-validation-rules-in-sale...
 
Sales force certification-lab-ii
Sales force certification-lab-iiSales force certification-lab-ii
Sales force certification-lab-ii
 
Sales force certification-lab
Sales force certification-labSales force certification-lab
Sales force certification-lab
 
Managing users-doc
Managing users-docManaging users-doc
Managing users-doc
 
Force.com migration utility
Force.com migration utilityForce.com migration utility
Force.com migration utility
 

Kürzlich hochgeladen

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Essbase security implementation

  • 1. Document: “Implementing Security in Oracle Hyperion Essbase using Shared Service” Description: This document provides an overview of security model of Hyperion Essbase using Shared Service. It also focuses on cell level security using Essbase filters and common administrative activities associated to user/group administrations. History: Version Description Author Publish Date Change 0.1 Initial Draft Gaurav Shrivastava 30-Mar-2011 0.1 Review I Amit Sharma 1st April ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 1
  • 2. . Table of contents 1) Introduction 2) Launching Shared Service 3) Converting Security Mode 4) Benefits of externalizing the security: 5) Working with Shared Service a) Creating Group b) Creating User 6) Add new Role 7) How to create user through maxl? 8) Refresh Security from Shared Services 9) Apply Provision 10) Creating Filter a) Read Write Filter b) Read Filter c) Meta Data Read Filter d) Read and No_access Filter e) Read Write and No_access f) Metadata Read and write filter g) Filter on member Combination h) Filter on member Combination Separately 11) Administration Option 12) Configuring User Directories 13) Recover Native Directory 14) Configure Auditing 15) Assign Access Control 16) Understanding Roles a) Shared Service Roles b) Essbase Roles . ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 2
  • 3. Introduction Shared service is a common system for managing user and group access to all oracle Hyperion products, including Essbase. The database organization, application organization and managing metadata can perform through shared services. Shared service has folder structure for Hyperion products, all application, database, artifacts and user directory information. Folder views enable the administrator to migrate an entire folder structure or a portion of a folder structure easily using Shared Services. You can perform migration through shared service. Launching Shared Service You can launch shared services through below URL. http://<server>:28080/interop/ Click Launch Application Pass the credential …. This is the shared service console by you can manage all Hyperion products. You can perform all administration tasks through this console such as user creation, user deletion, assigning roles managing ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 3
  • 4. groups etc. All application manages through folder structure and allow administrator to migrate an entire folder structure or a portion of a folder structure easily using Shared Services. Shared Services integrates the products to provide these functionalities: 1. User provisioning 2. External authentication definition 3. Task flow management The Shared Services server components: 1. Databases (relational and OpenLDAP) 2. Web application server 3. User Management Console Converting Security Mode: The default Essbase security mode is 'internal security' model. In this model, we see Essbase creating users, managing their passwords, and their access all within the Essbase product. Essbase uses Essbase.sec file to store security information locally in Essbase. It is therefore possible to have an Essbase server not manage roles and access via Shared Services, but that option is becoming increasingly uncommon. Its main use is for legacy Essbase servers to 'migrate' users from their legacy versions into the System 11 world of Shared Services. Alternatively we can externalize the security and let Shared Service manage the security for Essbase. Benefits of externalizing the security: 1) Backup/Restore Security: Provisioning information from Shared Services can be easily exported to XML using the utility that is packaged with Shared Services. This file contains all information about the LDAP users, groups, and provisioning. This same file could be used to import the provisioning in the event of a disaster recovery, file corruption or server upgrade 2) Automatic Refresh / Synchronization: SHAREDSERVICESREFRESHINTERVAL setting in the Essbase.cfg file can establish an interval for periodic refreshes from Shared Services to Essbase. This setting is in number of minutes. To refresh every 30 minutes, the setting would be SHAREDSERVICESREFRESHINTERVAL 30 3) Limited Admin Activities: Essbase Administration tasks confined to creation of Filters, Calculations, Load Rules, and Substitution Variables continue to be performed in the Essbase. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 4
  • 5. 4) Reduced Administration: User/Group administration can be pushed to LDAP from Essbase ‘internal security’ Thus, when a new user is to be added he or she will automatically get the proper Essbase security simply through the corporate security administrator establishing the user's id in the appropriate LDAP group. Right click on security and select externalize users. Click for conformation Don’t change default conversion settings click ok. Success message of convert security mode ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 5
  • 6. Working with Shared Service Creating Group Right click on “Groups” and select “New” Give group name and insert description about group then click next. Select group members…… Assign group member….click next….. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 6
  • 7. Assign user members for this new group…… Click finish Success message For validating new group go to the group native directory…… Creating User Open shared service expend user directories then native directory. Right click on user and click new Insert user information and click next ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 7
  • 8. Assign user to the group. Click finish Success message User created successfully, open user native directory for validation. Add new Role These are the available roles in shared services. You also can add new role through shared services. Right click and click new role. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 8
  • 9. How to create user through Maxl? You can create new user through Maxl script by following command. Provide access rights to new user by following command. Verify that access rights correctly assign to the user. When you login with the same user it will show only “Bisp” application. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 9
  • 10. Refresh Security from Shared Services When you make changes in to shared service you have to refresh shared service security. Open Essbase Right click on security select “Refresh security from shared services”. If you made changes for current user select current user else select refresh security for all users. Click ok… ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 10
  • 11. Conform and click yes… Success massage Apply Provision Through shared service you can apply provision to particular user. Right click on user Select desired roles from the available roles and save the changes.[List of roles are given in appendix] You can validate that “ram1” can access only “Bisp” and “Sample” application. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 11
  • 12. 1) Create user “Tom” through shared services Right click on user and assign the role to “Tom”. Now log off from the existing user and login through new user “Tom”. You can verify through right click on “Bisp” application and find that “Tom” is not administrator so that some options are disable. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 12
  • 13. Open users you can view the existing users but when you click on “Tom” or any other user only those rights will enable for which “Tom” has access rights. Creating Filter [Cell Level Security] You create filter through Maxl script and assign access right to any user. You can also create filter for the specific condition. The task flow will be first create filter, assign access rights to the user then login with the user and check filter is working. 1.Read Write Filter Open Maxl script and write script for creating filter for give Read Write access. Click ok…. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 13
  • 14. Press enter… Command for granting access right to the user “ORG”. Click on Execute button…….. You can verify that user “ORG” has access rights to write on “Budget” through lock and send method. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 14
  • 15. Data is loaded successfully. Again load data in actual field through lock and send method. When you update data in actual field and then try to lock it Essbase throw the below error. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 15
  • 16. 2. Read Filter Read only filter for the specify area. This filter is to restrict user for write in to database but user can read “New York”. You have to write Maxl script to create filter and grant filter to the user. Connect to “BispBD” database and try to update or write on “New York” data through lock and send method. Essbase will throw the below message. 3. Meta Data Read Filter This filter is to restrict user to access all cube data. User can access data for which he has access rights. Through Maxl Script you can apply filter for metadata read only. Create new maxl script write command for metadata read shown below then grant filter to any user. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 16
  • 17. Login by user “ORG” You can verify that “ORG” user should not access data other then “New York”. 3. Read and No_access Filter Filter on user define attributes. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 17
  • 18. UDAs in outline of cube Execute the Maxl script and see the impact on excel login through the user. 4. Read Write and No_access Create filter for providing read, write and no_access to the user “ORG”. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 18
  • 19. Verification of read access Verification of write access Database is modified. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 19
  • 20. Verification of no_access 5. Metadata Read and write filter Filter for assign metadata. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 20
  • 21. Assigning filter to the user through console Double click on user “ORG”….. This is the user information select “App/Db Access” tab. Open application databases then assign filter to the user and click apply. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 21
  • 22. Login with ORG user and then try to access market. Only “East” data is visual to the user. User also has update write, So update any value through lock and send method. To verify that data get updated or not “Retrieve” and check updated cell. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 22
  • 23. 6. Filter on member Combination You can also create filters on various combination of members. This is the filter for giving read access to the user only for combination of product “100-10” and “New York”. Below Maxl script for creating filter and assign to the user. You can see in to outline the alias for “100-10” is cola. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 23
  • 24. Login with “ORG” user and see the impact of filter on cube. 7. Filter on member Combination Separately You can also write filer on the separate bases as shown in below Maxl script. You can access complete data which has either “Cola” or “New York”. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 24
  • 25. Administration Option ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 25
  • 26. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 26
  • 27. Configuring User Directories You can configure user directory if it is required. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 27
  • 28. Native directory is already configure though there is option to edit provider configuration. Make changes and click finish. Recover Native Directory You also can recover native directory if something goes wrong. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 28
  • 29. Click on start recovery Native directory recovered successfully. This is the Log information of native dirctory. You can change or configure native directory password. Panel for changing password. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 29
  • 30. Configure Auditing ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 30
  • 31. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 31
  • 32. Assign Access Control to Essbase Cube Open shared service expend application group expend essbase server node Right click on application and select “Assign Access Control”. Select user from the available user then click next. Select database ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 32
  • 33. Apply filter and calculation script Select at least one user and click on Right check mark to validate settings. Save the changes ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 33
  • 34. Understanding Roles Shared Services Roles Administrator: is the power user. He can invoke shared services and perform administration tasks for all Hyperion products. Shared service components are Administrator Provides control over all products that integrate with Shared Services. It enables more control over security than any other Hyperion product roles. Administrators can perform all administrative tasks in User Management Console and can provision themselves. This role grants broad access to all applications registered with Shared Services. The Administrator role is, by default, assigned to the admin Native Directory user, which is the only user available after you deploy Shared Services. Directory Manager: Creates and manages users and groups within Native Directory. Do not assign to Directory Managers the Provisioning Manager role because combining these roles allows Directory Managers to provision themselves. The recommended practice is to grant one user the Directory Manager role and another user the Provisioning Manager role. LCM Manager Runs the Artifact Life-Cycle Management utility to promote artifacts or data across product environments and operating systems. LCM utility also use for migrate application on the same environment or different environment. Project Manager Users who are assigned the Project Manager role can create and manage projects within Shared Services ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 34
  • 35. Create Integrations Creates Shared Services data integrations (the process of moving data between applications) using a wizard. For Oracle's Enterprise Performance Management Architect, creates and executes data synchronizations. Run Integrations Views and runs Shared Services data integrations. For Performance Management Architect, executes data synchronizations. Dimension Editor Creates and manages import profiles for dimension creation. Also, creates and manages dimensions manually within the Performance Management Architect user interface or the Classic Application Administration option. Required to access Classic Application Administration options for Financial Management and Planning using Web navigation. Application Creator Creates and deploys Performance Management Architect applications. Users with this role can create applications, but can change only the dimensions to which they have access permissions. Required, in addition to the Dimension Editor role, for Financial Management and planning users to be able to Navigate to their product’s Classic Application Administration options. When a user with Application Creator role deploys an application from Performance Management Architect, that user automatically becomes the application administrator and provisioning manager for that application. The Application Creator can create all applications. Analytic Services Application Creator: The Analytic Services Application Creator can create Generic Performance Management Architect applications. Financial Management Application Creator: The Financial Management Application Creator can create Consolidation applications and Performance Management Architect Generic applications. To create applications, the user must also be a member of the Application Creators group specified in Financial Management Configuration Utility. Planning Application Creator: The Planning Application Creator can create Planning applications and Performance Management Architect Generic applications. Essbase Roles Power Roles Administrator Grants full access to administer the server, applications and databases Application Manager Creates deletes and modifies databases, and application settings within the assigned application. Includes Database Manager Permissions for the databases within the assigned application Create/Delete Application Creates and deletes applications and databases within applications. Includes Manager Permissions for the applications and databases created by this user Database Manager Manages the databases, database objects, locks and sessions within the assigned application Load/Unload Application Start and stops an application or databases. Interactive Roles Calc: - Calculates, updates and reads data values based on the assigned scope, using any assigned calculations and filter Write: -Updates and reads data values based on the assigned scope, using any assigned filter Filter: - Accesses specific data and meta data according to the restrictions of a filter View Roles Read: - Read data values Server Access: - Accesses any database that has a default access other than none ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 35
  • 36. ©Business Intelligence Solution Providers | learnhyperion.wordpress.com 36