SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Automating Security Management in
PBCS!
Dayalan Punniyamoorthy
Oracle ACE
Practice Manager, Inspirage.
© Copyright 2007-2020 Inspirage. All rights reserved.
2
EPM CLOUD SOLUTIONS
Financial Close and Consolidation
Budgeting and Forecasting
Reporting and Analytics
Profitability and Cost Management
Master Data Management
ERP CLOUD SOLUTIONS
ADVISORY
MANAGED SERVICES
DELIVERING ORACLE EPM & ERP
CLOUD SOLUTIONS GLOBALLY
NOW A PART OF
The Integrated Supply Chain Specialists
© Copyright 2007-2020 Inspirage. All rights reserved.
ORACLE EPM EXPERIENCE
• Oracle® Certified Platinum Partner
• One of the nation’s leading Oracle EPM strategy &
implementation firms
• Successfully implemented Oracle EPM solutions
for dozens of clients in the US, and abroad
• Oracle EPM professional average 15 years of
hands-on experience
• Focused on Fortune 500 companies & large scale,
enterprise-wide implementations
• Deep expertise from process design to technology
implementation
• Proven functional and industry templates to
leverage best practices
• Hyperion Essbase, Planning and HFM certified
professionals
3
Enterprise
Planning
Business
Intelligence
Reporting and
Analytics
Financial
Consolidation
© Copyright 2007-2020 Inspirage. All rights reserved.
4
The Session will address the following points:
• Introduction to Security in Oracle Planning and Budgeting
Cloud
• What are the artifacts/granular level that can have security
in PBC?
• What are the best practices for addressing security?
• How can you mass update security using EPM Automate,
REST API, Groovy, LCM, etc
• Demo
• Q&A
AGENDA
© Copyright 2007-2020 Inspirage. All rights reserved.
5
SECURITY IN PBC
Identity Domain Administrators create and manage Oracle
Enterprise Performance Management Cloud users. While users
are shared across test and production environments, they are
provisioned separately for each environments
Users
• Each user who needs to access an environment must have an
account in the identity domain associated with the environment.
Groups
• Comprising identity domain users or other groups. Assigning roles
to such groups enables Service Administrators to grant roles to
many users at once, thereby reducing administrative overheads.
You can no longer use
Access Control to
import group
information from a file
to create groups.
Similarly you cannot
export group
information using
Access Control. You
may use Migration or
EPM Automate
commands to export
and import groups.
© Copyright 2007-2020 Inspirage. All rights reserved.
6
Roles
Roles link users to the business activities that they are
permitted to perform within an environment and the data
that they can access.
Predefined Roles
• Service Administrator
• Power User
• User
• Viewer
SECURITY IN PBC
© Copyright 2007-2020 Inspirage. All rights reserved.
• Access Control enables you to complete these
activities in an environment:
• Managing Groups
• Assigning Roles to a Group or a User
• Generating a Role Assignment Report for a User or
Group
• Generating the Role Assignment Report For Your
Environment
• Viewing the User Login Report
• No utilities (e.g. importsecurity/exportsecurity)
we have in On-Premises version
ACCESS CONTROL
7
© Copyright 2007-2020 Inspirage. All rights reserved.
8
ACCESS CONTROL
© Copyright 2007-2020 Inspirage. All rights reserved.
 Dimensions, including user-defined dimensions
 Launch privileges to rules
 Rule folders
 Forms
 Dashboards
 Infolets
 Reports, Books, and Bursting Definitions
 Form folders
 Dashboard folders
 Infolet folders
 Reports and Documents folders
 Task lists
 Groovy templates
9
APPLICATION ARTIFACTS THAT CAN BE
ASSIGNED PERMISSIONS
© Copyright 2007-2020 Inspirage. All rights reserved.
Valid intersections are cell interactions which are filtered based on rules you define, called valid intersection rules,
which filter certain cell intersections to users when they enter data or select runtime prompts.
For example, you can specify that certain programs are valid only for some periods or departments.
After valid intersections are defined, cells containing invalid data are read-only. This restriction speeds the
planning process and optimizes the information available to users.
VALID INTERSECTIONS
10
© Copyright 2007-2020 Inspirage. All rights reserved.
Service Administrators applying cell-level security can deny access to cells that a user would normally have access to
due to their regular security. Cell-level security is therefore defined as an exception to the existing member security
Cell-level security uses rules, similar to valid intersection rules, to deny read or write access to users viewing certain
cell intersections anywhere a cell is shown (for example, forms, runtime prompts, Smart View, reports, dashboards,
infolets, and so on).
When cell-level security rules are applied, users with read access can see the data value in a cell but the cell is
not editable. If users are denied read access to a cell, the value displayed in the cell is #noaccess.
Service Administrator, an define and assign cell-level security rules to any user or group. It doesn't affect Service
Administrator.
CELL-LEVEL SECURITY
11
© Copyright 2007-2020 Inspirage. All rights reserved.
12
ACCESS PRECEDENCE
NONE Access
WRITTE Access
READ Access
GROUP Access
Highest
PREDENCE
Lowest
USER Access
© Copyright 2007-2020 Inspirage. All rights reserved.
13
ACCESS
CONTROL
REPORTS
Report that shows
which Groups have
access to which
Dimensions and the
specific values within
those Dimensions.
© Copyright 2007-2020 Inspirage. All rights reserved.
14
OPTIONS TO ADDRESS SECURITY IN BULK?
LCM (Migration)
Users
Groups
Roles
Users.xml contains all entries for user specific access
Under Groups folder, each <groupname>.xml is specific to that group
© Copyright 2007-2020 Inspirage. All rights reserved.
15
OPTIONS TO
ADDRESS SECURITY
IN BULK?
LCM
© Copyright 2007-2020 Inspirage. All rights reserved.
16
EPM Automate
OPTIONS TO ADDRESS SECURITY IN BULK?
© Copyright 2007-2020 Inspirage. All rights reserved.
17
EPM Automate
OPTIONS TO ADDRESS SECURITY IN BULK?
 addUsers
epmautomate addUsers FILE_NAME
userPassword=PASSWORD
resetPassword=true|false
 addUsersToGroup
epmautomate addUsersToGroup user_file.CSV
example_group
 assignRole
epmautomate assignRole FILE_NAME
 importAppSecurity
epmautomate importAppSecurity Acl_file.CSV
Acl_import_error.CSV clearall=true
 removeUsers
epmautomate removeUsers Remove_Users.CSV
 removeUsersFromGroup
epmautomate removeUsersFromTeam
example_users.csv example_team
© Copyright 2007-2020 Inspirage. All rights reserved.
18
REST API Resource view
OPTIONS TO ADDRESS
SECURITY IN BULK?
© Copyright 2007-2020 Inspirage. All rights reserved.
19
REST API Resource view
OPTIONS TO ADDRESS
SECURITY IN BULK?
© Copyright 2007-2020 Inspirage. All rights reserved.
BRINGING THE MAGIC
20 © Copyright 2007-2020 Inspirage. All rights reserved.
© Copyright 2007-2020 Inspirage. All rights reserved.
21
OPTIONS TO ADDRESS
SECURITY IN BULK?
//1.
//addUsersToGroup("addUsersToGrpCapEx.csv", "Accounts_CapEx"); //PUT
//2.
//removeUsersFromGroup("addUsersToGrpCapEx.csv", "Accounts_CapEx"); //PUT
//3.
//assignUsersRoles("assignUsersRoles.csv", "Mass Allocation"); //PUT
//4.
//assignUsersRoles("assignUsersRoles.csv", "Drill Through"); //PUT
//5.
//unassignUsersRoles("assignUsersRoles.csv", "Mass Allocation"); //PUT
//6.
//generateUserGroupReport("UserGroupReport6.csv")
//7.
//generateRoleAssignmentReport("RoleAssignmentReport6.csv");
© Copyright 2007-2020 Inspirage. All rights reserved.
© Copyright 2007-2020 Inspirage. All rights reserved.
Q&A
22
DEMOEMO
© Copyright 2007-2020 Inspirage. All rights reserved.
© Copyright 2007-2020 Inspirage. All rights reserved.
Q&A
23
CONCLUSION
Massupdateoptions
Massupdateoptions
Massupdateoptions
Massupdateoptions
 LCM
LCM
LCM
LCM
 EPM
EPM
EPM
EPMAutomate
Automate
Automate
Automate
 RESTAPI
RESTAPI
RESTAPI
RESTAPI
 Groovy(RESTAPI)
Groovy(RESTAPI)
Groovy(RESTAPI)
Groovy(RESTAPI)
© Copyright 2007-2020 Inspirage. All rights reserved.
www.inspirage.com
Dayalan Punniyamoorthy
@pdayalan www.linkedin.com/in/dayalanpunniyamoorthy/
Personal Blog: https://onlyhyperion.blogspot.com/

Weitere ähnliche Inhalte

Was ist angesagt?

I Can do WHAT with PCMCS? Features and Functions, Business Benefits, and Use...
I Can do WHAT with PCMCS?  Features and Functions, Business Benefits, and Use...I Can do WHAT with PCMCS?  Features and Functions, Business Benefits, and Use...
I Can do WHAT with PCMCS? Features and Functions, Business Benefits, and Use...
Alithya
 
Hyperion Implementation Questionaries
Hyperion Implementation QuestionariesHyperion Implementation Questionaries
Hyperion Implementation Questionaries
Amit Sharma
 

Was ist angesagt? (20)

Fusion ERP Direct Integration with EPBCS
Fusion ERP Direct Integration with EPBCSFusion ERP Direct Integration with EPBCS
Fusion ERP Direct Integration with EPBCS
 
I Can do WHAT with PCMCS? Features and Functions, Business Benefits, and Use...
I Can do WHAT with PCMCS?  Features and Functions, Business Benefits, and Use...I Can do WHAT with PCMCS?  Features and Functions, Business Benefits, and Use...
I Can do WHAT with PCMCS? Features and Functions, Business Benefits, and Use...
 
The Wright Move – A Continued Journey to the Oracle EPM Cloud
 The Wright Move – A Continued Journey to the Oracle EPM Cloud The Wright Move – A Continued Journey to the Oracle EPM Cloud
The Wright Move – A Continued Journey to the Oracle EPM Cloud
 
Best practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementationBest practices for fusion hcm cloud implementation
Best practices for fusion hcm cloud implementation
 
Finit - Breaking Through the Cloud: An Overview of Oracle EPM Cloud
Finit - Breaking Through the Cloud: An Overview of Oracle EPM CloudFinit - Breaking Through the Cloud: An Overview of Oracle EPM Cloud
Finit - Breaking Through the Cloud: An Overview of Oracle EPM Cloud
 
GETTING STARTED WITH GROOVY FOR THE NON-TECHNICAL SUPERSTARS
  GETTING STARTED WITH GROOVY FOR THE NON-TECHNICAL SUPERSTARS  GETTING STARTED WITH GROOVY FOR THE NON-TECHNICAL SUPERSTARS
GETTING STARTED WITH GROOVY FOR THE NON-TECHNICAL SUPERSTARS
 
EPM, ERP, Cloud, and On-Premise: All Integration Options Explained
EPM, ERP, Cloud, and On-Premise:  All Integration Options ExplainedEPM, ERP, Cloud, and On-Premise:  All Integration Options Explained
EPM, ERP, Cloud, and On-Premise: All Integration Options Explained
 
Loading Smartlists into PBCS using FDMEE
Loading Smartlists into PBCS using FDMEELoading Smartlists into PBCS using FDMEE
Loading Smartlists into PBCS using FDMEE
 
Hyperion Implementation Questionaries
Hyperion Implementation QuestionariesHyperion Implementation Questionaries
Hyperion Implementation Questionaries
 
Read 1-hyperion planning presentation
Read 1-hyperion planning presentationRead 1-hyperion planning presentation
Read 1-hyperion planning presentation
 
My Favorite Calc Code
My Favorite Calc CodeMy Favorite Calc Code
My Favorite Calc Code
 
Simplify Complex Consolidations and Close Processes with Oracle Financial Con...
Simplify Complex Consolidations and Close Processes with Oracle Financial Con...Simplify Complex Consolidations and Close Processes with Oracle Financial Con...
Simplify Complex Consolidations and Close Processes with Oracle Financial Con...
 
Beginning Calculation Manager for Essbase and Hyperion Planning
Beginning Calculation Manager for Essbase and Hyperion Planning Beginning Calculation Manager for Essbase and Hyperion Planning
Beginning Calculation Manager for Essbase and Hyperion Planning
 
Security of hyperion planning
Security of hyperion planningSecurity of hyperion planning
Security of hyperion planning
 
Oracle Enterprise PBCS Driver Based Planning and Budgeting
Oracle Enterprise PBCS Driver Based Planning and BudgetingOracle Enterprise PBCS Driver Based Planning and Budgeting
Oracle Enterprise PBCS Driver Based Planning and Budgeting
 
Groovy and PBCS is Game Changing
Groovy and PBCS is Game ChangingGroovy and PBCS is Game Changing
Groovy and PBCS is Game Changing
 
OOW15 - managing oracle e-business suite auditing and security
OOW15 - managing oracle e-business suite auditing and securityOOW15 - managing oracle e-business suite auditing and security
OOW15 - managing oracle e-business suite auditing and security
 
Oracle Fusion HCM vs E-Business Suite HRMS
Oracle Fusion HCM vs E-Business Suite HRMSOracle Fusion HCM vs E-Business Suite HRMS
Oracle Fusion HCM vs E-Business Suite HRMS
 
The Wright Way into the Cloud: The Argument for ARCS
The Wright Way into the Cloud:  The Argument for ARCSThe Wright Way into the Cloud:  The Argument for ARCS
The Wright Way into the Cloud: The Argument for ARCS
 
Transforming Financial Insights with Oracle EPM
Transforming Financial Insights with Oracle EPMTransforming Financial Insights with Oracle EPM
Transforming Financial Insights with Oracle EPM
 

Ähnlich wie Automating Security Management in PBCS!

FLS_EA_Checklist_AppName_v5.pptx
FLS_EA_Checklist_AppName_v5.pptxFLS_EA_Checklist_AppName_v5.pptx
FLS_EA_Checklist_AppName_v5.pptx
ssuser7b9cdf
 

Ähnlich wie Automating Security Management in PBCS! (20)

ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
Omc for oracle_ebs_demo_script
Omc for oracle_ebs_demo_scriptOmc for oracle_ebs_demo_script
Omc for oracle_ebs_demo_script
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditor
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners Guide
 
Automation Hub Best Practices - Large Scale Rollouts.pdf
Automation Hub Best Practices - Large Scale Rollouts.pdfAutomation Hub Best Practices - Large Scale Rollouts.pdf
Automation Hub Best Practices - Large Scale Rollouts.pdf
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
Contract management security and administration best practices - Oracle Prima...
Contract management security and administration best practices - Oracle Prima...Contract management security and administration best practices - Oracle Prima...
Contract management security and administration best practices - Oracle Prima...
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
 
MySQL: Create multiple DB accounts for an app using SYSTEM_USER privilege and...
MySQL: Create multiple DB accounts for an app using SYSTEM_USER privilege and...MySQL: Create multiple DB accounts for an app using SYSTEM_USER privilege and...
MySQL: Create multiple DB accounts for an app using SYSTEM_USER privilege and...
 
Upwork presentaion in distributed systems
Upwork presentaion in distributed systemsUpwork presentaion in distributed systems
Upwork presentaion in distributed systems
 
Web–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsWeb–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive Graphs
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphs
 
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Machine Learning to Turbo-Charge the Ops Portion of DevOpsMachine Learning to Turbo-Charge the Ops Portion of DevOps
Machine Learning to Turbo-Charge the Ops Portion of DevOps
 
FLS_EA_Checklist_AppName_v5.pptx
FLS_EA_Checklist_AppName_v5.pptxFLS_EA_Checklist_AppName_v5.pptx
FLS_EA_Checklist_AppName_v5.pptx
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 

Kürzlich hochgeladen

Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 

Kürzlich hochgeladen (17)

SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 

Automating Security Management in PBCS!

  • 1. Automating Security Management in PBCS! Dayalan Punniyamoorthy Oracle ACE Practice Manager, Inspirage.
  • 2. © Copyright 2007-2020 Inspirage. All rights reserved. 2 EPM CLOUD SOLUTIONS Financial Close and Consolidation Budgeting and Forecasting Reporting and Analytics Profitability and Cost Management Master Data Management ERP CLOUD SOLUTIONS ADVISORY MANAGED SERVICES DELIVERING ORACLE EPM & ERP CLOUD SOLUTIONS GLOBALLY NOW A PART OF The Integrated Supply Chain Specialists
  • 3. © Copyright 2007-2020 Inspirage. All rights reserved. ORACLE EPM EXPERIENCE • Oracle® Certified Platinum Partner • One of the nation’s leading Oracle EPM strategy & implementation firms • Successfully implemented Oracle EPM solutions for dozens of clients in the US, and abroad • Oracle EPM professional average 15 years of hands-on experience • Focused on Fortune 500 companies & large scale, enterprise-wide implementations • Deep expertise from process design to technology implementation • Proven functional and industry templates to leverage best practices • Hyperion Essbase, Planning and HFM certified professionals 3 Enterprise Planning Business Intelligence Reporting and Analytics Financial Consolidation
  • 4. © Copyright 2007-2020 Inspirage. All rights reserved. 4 The Session will address the following points: • Introduction to Security in Oracle Planning and Budgeting Cloud • What are the artifacts/granular level that can have security in PBC? • What are the best practices for addressing security? • How can you mass update security using EPM Automate, REST API, Groovy, LCM, etc • Demo • Q&A AGENDA
  • 5. © Copyright 2007-2020 Inspirage. All rights reserved. 5 SECURITY IN PBC Identity Domain Administrators create and manage Oracle Enterprise Performance Management Cloud users. While users are shared across test and production environments, they are provisioned separately for each environments Users • Each user who needs to access an environment must have an account in the identity domain associated with the environment. Groups • Comprising identity domain users or other groups. Assigning roles to such groups enables Service Administrators to grant roles to many users at once, thereby reducing administrative overheads. You can no longer use Access Control to import group information from a file to create groups. Similarly you cannot export group information using Access Control. You may use Migration or EPM Automate commands to export and import groups.
  • 6. © Copyright 2007-2020 Inspirage. All rights reserved. 6 Roles Roles link users to the business activities that they are permitted to perform within an environment and the data that they can access. Predefined Roles • Service Administrator • Power User • User • Viewer SECURITY IN PBC
  • 7. © Copyright 2007-2020 Inspirage. All rights reserved. • Access Control enables you to complete these activities in an environment: • Managing Groups • Assigning Roles to a Group or a User • Generating a Role Assignment Report for a User or Group • Generating the Role Assignment Report For Your Environment • Viewing the User Login Report • No utilities (e.g. importsecurity/exportsecurity) we have in On-Premises version ACCESS CONTROL 7
  • 8. © Copyright 2007-2020 Inspirage. All rights reserved. 8 ACCESS CONTROL
  • 9. © Copyright 2007-2020 Inspirage. All rights reserved.  Dimensions, including user-defined dimensions  Launch privileges to rules  Rule folders  Forms  Dashboards  Infolets  Reports, Books, and Bursting Definitions  Form folders  Dashboard folders  Infolet folders  Reports and Documents folders  Task lists  Groovy templates 9 APPLICATION ARTIFACTS THAT CAN BE ASSIGNED PERMISSIONS
  • 10. © Copyright 2007-2020 Inspirage. All rights reserved. Valid intersections are cell interactions which are filtered based on rules you define, called valid intersection rules, which filter certain cell intersections to users when they enter data or select runtime prompts. For example, you can specify that certain programs are valid only for some periods or departments. After valid intersections are defined, cells containing invalid data are read-only. This restriction speeds the planning process and optimizes the information available to users. VALID INTERSECTIONS 10
  • 11. © Copyright 2007-2020 Inspirage. All rights reserved. Service Administrators applying cell-level security can deny access to cells that a user would normally have access to due to their regular security. Cell-level security is therefore defined as an exception to the existing member security Cell-level security uses rules, similar to valid intersection rules, to deny read or write access to users viewing certain cell intersections anywhere a cell is shown (for example, forms, runtime prompts, Smart View, reports, dashboards, infolets, and so on). When cell-level security rules are applied, users with read access can see the data value in a cell but the cell is not editable. If users are denied read access to a cell, the value displayed in the cell is #noaccess. Service Administrator, an define and assign cell-level security rules to any user or group. It doesn't affect Service Administrator. CELL-LEVEL SECURITY 11
  • 12. © Copyright 2007-2020 Inspirage. All rights reserved. 12 ACCESS PRECEDENCE NONE Access WRITTE Access READ Access GROUP Access Highest PREDENCE Lowest USER Access
  • 13. © Copyright 2007-2020 Inspirage. All rights reserved. 13 ACCESS CONTROL REPORTS Report that shows which Groups have access to which Dimensions and the specific values within those Dimensions.
  • 14. © Copyright 2007-2020 Inspirage. All rights reserved. 14 OPTIONS TO ADDRESS SECURITY IN BULK? LCM (Migration) Users Groups Roles Users.xml contains all entries for user specific access Under Groups folder, each <groupname>.xml is specific to that group
  • 15. © Copyright 2007-2020 Inspirage. All rights reserved. 15 OPTIONS TO ADDRESS SECURITY IN BULK? LCM
  • 16. © Copyright 2007-2020 Inspirage. All rights reserved. 16 EPM Automate OPTIONS TO ADDRESS SECURITY IN BULK?
  • 17. © Copyright 2007-2020 Inspirage. All rights reserved. 17 EPM Automate OPTIONS TO ADDRESS SECURITY IN BULK?  addUsers epmautomate addUsers FILE_NAME userPassword=PASSWORD resetPassword=true|false  addUsersToGroup epmautomate addUsersToGroup user_file.CSV example_group  assignRole epmautomate assignRole FILE_NAME  importAppSecurity epmautomate importAppSecurity Acl_file.CSV Acl_import_error.CSV clearall=true  removeUsers epmautomate removeUsers Remove_Users.CSV  removeUsersFromGroup epmautomate removeUsersFromTeam example_users.csv example_team
  • 18. © Copyright 2007-2020 Inspirage. All rights reserved. 18 REST API Resource view OPTIONS TO ADDRESS SECURITY IN BULK?
  • 19. © Copyright 2007-2020 Inspirage. All rights reserved. 19 REST API Resource view OPTIONS TO ADDRESS SECURITY IN BULK?
  • 20. © Copyright 2007-2020 Inspirage. All rights reserved. BRINGING THE MAGIC 20 © Copyright 2007-2020 Inspirage. All rights reserved.
  • 21. © Copyright 2007-2020 Inspirage. All rights reserved. 21 OPTIONS TO ADDRESS SECURITY IN BULK? //1. //addUsersToGroup("addUsersToGrpCapEx.csv", "Accounts_CapEx"); //PUT //2. //removeUsersFromGroup("addUsersToGrpCapEx.csv", "Accounts_CapEx"); //PUT //3. //assignUsersRoles("assignUsersRoles.csv", "Mass Allocation"); //PUT //4. //assignUsersRoles("assignUsersRoles.csv", "Drill Through"); //PUT //5. //unassignUsersRoles("assignUsersRoles.csv", "Mass Allocation"); //PUT //6. //generateUserGroupReport("UserGroupReport6.csv") //7. //generateRoleAssignmentReport("RoleAssignmentReport6.csv");
  • 22. © Copyright 2007-2020 Inspirage. All rights reserved. © Copyright 2007-2020 Inspirage. All rights reserved. Q&A 22 DEMOEMO
  • 23. © Copyright 2007-2020 Inspirage. All rights reserved. © Copyright 2007-2020 Inspirage. All rights reserved. Q&A 23 CONCLUSION Massupdateoptions Massupdateoptions Massupdateoptions Massupdateoptions  LCM LCM LCM LCM  EPM EPM EPM EPMAutomate Automate Automate Automate  RESTAPI RESTAPI RESTAPI RESTAPI  Groovy(RESTAPI) Groovy(RESTAPI) Groovy(RESTAPI) Groovy(RESTAPI)
  • 24. © Copyright 2007-2020 Inspirage. All rights reserved. www.inspirage.com Dayalan Punniyamoorthy @pdayalan www.linkedin.com/in/dayalanpunniyamoorthy/ Personal Blog: https://onlyhyperion.blogspot.com/