Hyperion Planning Security – A Balancing Act
Computers & Technology → Technology
- Author Gidon Albert
- Published October 25, 2011
- Word count 607
Managing security is a balancing act and even more so in Hyperion Planning. On the one hand, the administrator must satisfy management’s requirements that only users who need to see the data will have access to the data. On the other hand, the administrator must find a way to ensure the security model can be managed and maintained.
These two requirements don’t often go hand in hand.
Management, of course, wants to implement security on every area of the planning cube. After all, it is natural for management to demand strict secrecy in a planning application. Planning data is extremely sensitive since it describes the future of the company. Management is correct to require complex security rules and segregation of information.
Managing multiple groups along multiple dimensions can be a daunting task. Keeping track of which users go in what group along with the applicable filters requires careful consideration and special attention to details. It is an administrator’s nightmare. Administrators often have to rely on spreadsheets to maintain master lists of users, groups, filters, roles, etc.
To help make this task easier, here are a few hints on what does and doesn’t work:
• Nesting groups within groups – This method can save a lot of time when setting up the groups. However, it is hard to maintain because individual users do not appear directly in the group. For example, to see which access a given users has, the admin must open several groups until the answer is found.
• ExportSecurity.cmd and ImportSecurity.cmd – Managing filters in Planning by using the security features in Workspace is cumbersome and slow. Using the ImportSecurity.cmd is easy, quick and efficient. In addition, the source file used to upload the security information can be used for back-up and documentation.
• File system in Shared Services – Using this utility to make changes to Groups and Users provides the same benefits described in the above item.
• Define groups that mimic the dimension structure – It is tempting to create a group for every function or team. Using this approach will lead to having a very large number of groups. Mimicking the dimension structure allows the administrator to take advantage of the ‘intersection’ concept of multi dimensional databases. For example, in an environment were security is defined along the cost center, entity, account, version and scenario dimensions, the user gets access based on the intersection of the cost center, entity, account, version and scenario groups.
• ‘Super Groups’ – A super group is a group that has all users in it. You can use these groups to control access to the Planning dimensions such as account, version and scenario. Since the Planning dimensions must have security enabled, they may also share the same access for all users. For example, all users must be able to write to the active scenario and version. In this case, use the ‘Super Group’ to give everyone access to these dimensions.
• Consistent naming conventions – For clarity and ease of use, it is important to maintain a consistent naming convention. For example [planning designation][Application name][dimension identifier]_[functional description], PLN_ESTCUBE_CC_ITSupprt.
• Group descriptions – Make sure to write a clear description of the group when it is set up. This will help later for back-up and documentation.
• Demonstrate the impact of security filters – Show management the impact of increasing the number of security filters. Making the impact available to management may pay dividends in the future. It will help management to come up with reasonable levels of access.
Creating and managing security filters are not easy tasks. However, using the above tips, the job can be made less daunting.
Gidon Albert, a consultant for TopDown Consulting, has 15+ years experience successfully managing increased responsibilities in large-scale, integrated and complex Fortune 500 organizations.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- The Real Risk of Tokenized Assets: Legal Black Holes
- Why the Best Colocation in Israel Could Save Your Infrastructure – 10 Questions Every IT Leader Should Ask.
- Top CRM Tools to Manage and Track Solar Appointments Efficiently
- Influence of People Counting in Optimizing Staff Scheduling and Preventing Lost Sales
- Digital Silence: Creative Uses of Invisible Characters in Everyday Online Life
- 8 Challenges in B2B Logistics and How Moovick Solves Them
- Fix 'OLM File Not Opening' Error in Windows – Complete Guide
- Expert Managed IT Support in Washington, DC for Modern Businesses
- Why Modern Businesses Need Performance Management Software to Stay Competitive
- Free Test Management Tools: Top Picks for QA 2025
- Prompt Engineering in Salesforce: How to Optimize Prompts for Einstein GPT
- Vancouver E-Commerce Alert: The Top Tech Trends from ChatGPT to Cainiao
- Mastering Timesheet Approvals for Business Owners: From Bottlenecks to Breakthroughs.
- Top Benefits of Using Competency Management Software in Modern Organizations
- Maximize ROI with Personalized and Automated Lead Nurturing Solutions
- Maximize Sales Funnel Efficiency with Smart Automated Lead Nurturing Systems
- Boost Revenue and Team Efficiency with the Right Sales Enablement Platform Today
- How Bullseye Engagement’s Competency Tracking Software Enhances Workforce Performance
- Lesson Management Systems: Shaping the Future of K-12 Schools
- What Are the Features and Tech Stack of Web3 Game in UAE?
- Artsyl Technologies Recognized Among Top Performers in Accounts Payable Automation
- The Role of 5G and Advanced Networks in the United States: Bridging the Digital Divide
- ADA Price Prediction: What Experts Say About Cardano's Future Value
- BOSS Continual Improvement Software – The Backbone of Agile Quality Management Omnex Systems
- The Rise of Software to Monitor Employee Computer Activity: Balancing Productivity, Privacy, and Ethics
- Electronic Document Management System: Efficiency and Challenges in the Digital Age
- Why Shift Scheduling Matters: How to Optimize Labor Costs in Business Central
- Green Banking Market: Trends and Opportunities by 2030
- Troubleshooting Common Windows Server Issues: IT Support Services in London for SMBS
- Freight Price Rules in Business Central for Transparent Shipping Costs