Skip to Main Content
Return to Navigation

Reporting Secondary Security by User

Access the Secondary Security by User page select (Planning and Budgeting, then select System Administration, then select Administer User Security, then select Secondary Security by User).

Image: Secondary Security by User page

This example illustrates the fields and controls on the Secondary Security by User page.

Secondary Security by User page

Enter a range of user IDs or dimension values and then click Refresh Report to display existing permissions for the given search criteria.