Skip to Main Content
Return to Navigation

Integrating with EPM Warehouse Security

The EPM Warehouse security defines:

Access rights for a user are the combined access provided to them by their membership in roles.

To set up secured access for a dimension in the warehouse, the security administrator defines the access rules and then executes a batch program that processes the rules into flattened security join tables (SJTs). These tables are then queried by EPM applications to determine what data is accessible by a certain user.

Planning and Budgeting has its own set of security tables that contain information about users and their access rights. To leverage the warehouse security in Planning and Budgeting, we deliver a batch program (Request Security Processing) that accesses the SJTs and updates the Planning and Budgeting security tables with the same information. You must execute the Planning and Budgeting batch program after the warehouse security program has modified the SJTs.

To that end, you:

  1. Define a jobstream containing both the warehouse and the Planning and Budgeting security batch processes, using the Jobstream page select (EPM Foundation, then select Job Processing, then select Setup Engines and Jobstreams, then select Processes in Jobstreams).

    Image: Jobstream page

    This example illustrates the fields and controls on the Jobstream page.

    Jobstream page
  2. Run the jobstream from the Request Security processing page select (EPM Foundation, then select EPM Security, then select Advanced, then select Request Security Processing).

    Image: Request Security Processing page

    This example illustrates the fields and controls on the Request Security Processing page.

    Request Security Processing page

The EPM batch process performs the following steps:

Note: Any security access granted to a user ID applies to all planning centers for that user. Additionally, there is no need to run the security processing program by business unit because security is run at the setID level.

See Understanding EPM Security and Setups.

See Understanding Jobstreams.