Security

FDMEE supports the following roles:

FDMEE RolesTasks per Role
AdministratorManages applications and performs any action in FDMEE. When you login with the Administrator role, all links are visible in the Tasks pane.
Create Integration

Creates FDMEE metadata and data rules. If you have the Create Integration role, you can:

  • Create, delete and edit metadata rules and data rules

  • View process details

  • Perform period mappings

Note:

You cannot run rules or view, create, edit, or delete source system registrations, target system registrations or source accounting entities.

When you login with the Create Integration role, these links are visible in the Tasks pane: Data Load, Member Mapping, HR Data Load, Metadata, and Process Detail.

Drill Through

Controls the ability to drill through to the source system.

In FDMEE, this role controls whether you can drill to the FDMEE landing page, which controls drilling to the source system.

Note:

Drill through is not supported for Financial Management journals and intercompany transactions.

Run Integration Runs existing FDMEE metadata and data rules. If you have the Run Integration role, you can:
  • Run metadata rules or data rules

  • View process details

Note:

You cannot view, create, edit, or delete source system registrations, target system registrations or source accounting entities.

FDMEE users who need to extract data from Oracle or PeopleSoft Enterprise Financial Management must be granted this role to enable them to run data rules.

When you login with the Run Integration role, these links are visible in the Tasks pane: Data Load Workbench, Data Load, Member Mapping, HR Data Load, Metadata, and Process Detail.

GL Write BackEnables data write-back to the ERP source system.

When you login with the GL Write Back role, only the Write-Back Workbench, Write-Back Rule and Write-Back Mapping links are visible in the Tasks pane.

Intermediate 2-9Roles 2-9 for intermediate levels are defined by the administrator.

Note:

FDMEE users are allowed to define mappings for only target applications in which they have access.