Difference between HFM and Essbase user security in 9.3.1 version

Hi,
Could any one explain the differences between Hyperion Essbase and HFM security setup using HSS in 9.3.1
Thanks
Edited by: user10305642 on Jul 13, 2009 12:39 AM

HFM and Essbase security is totally different... HFM uses security classes while Essbase uses security filters.
The way you assign security is also different.
HFM also has more roles than Essbase.
You will find further info in the Security Administration Guide:
http://download.oracle.com/docs/cd/E10530_01/doc/epm.931/hyp_security_guide.pdf
Hiope this helps,
Seb

Similar Messages

  • What is the difference between "Replace" and "Replace by Security"

    Hi all,
    I am implementing FDM to Load data to HFM, I set them up with a proper security on the shared service and FDM. When I load data to HFM from FDM, there are 4 options to load data. (Replace, Merge, Accumulate, Replace by Security)
    A document states that
    Replace: Clears all account values from the target application, and replaces that the data in the application with the data in the load file.
    Replace by Security: Loads data to the target application only for members to which you have access.
    However, even if I used “Replace”, it worked with security which I set.
    Does anyone know what the difference between “Replace” and “Replace by Security”?
    Is there any way that FDM works without security?
    Thanks in advance
    taku

    The fact both methods are producing the same results will either be coincidence or perhaps because you are mis-interpreting the difference between the 2. When you run a Replace HFM will clear out all data based on the combination of Scenario, Year, Period, Entity and Value dimensions it does not care if you have set up security classes which may restrict access to any of the other dimensions i.e. Account, Custom1 thru 4. When you use Replace By Security HFM will still clear on the original criteria but it will respect security class restrictions set up on the other dimensions e.g. if you are assigned to a security class which is restricted to accessing only a certain subset of accounts, HFM will not clear data fro the accounts you don't have access to when you use Replace By Security

  • Whats the difference between EPMA and Essbase Studio

    Aren't they both used for designing applications?
    And do one really need Essbase Studio?

    Whats the difference between EPMA and Essbase Studio ^^^It is a bit confusing, isn't it? As far as I understand EPMA's role, it's a way to share common dimensions and data across multiple Oracle EPM products including Essbase, Planning, and HFM. I actually don't know if other products live in EPMA. What EPMA does not have is a nice way of sourcing or manipulating dimension and fact tables (or even files). Oh, there are interface tables, but you will write code/use the EPMA dimension utility to load dimensions. I have to say I've never tried to load data through EPMA so someone else is going to have to comment on that. Once dimensions are built, you can deploy Essbase (and other products) from common and database-specific dimensions.
    Studio is the tool you would use to go against a data warehouse, or something awfully close to a data warehouse to build Essbase databases. It's for Essbase only -- Planning, HFM, etc. are not the targets of Studio's output.
    What gets confusing/intriguing is that when EPMA deploys Essbase apps, it uses Studio under the covers to do so. Thus the interesting implementations where people use Studio (which is way more flexible than EPMA because it is a development tool as opposed to a dimension/data management app) to read the EPMA interface tables (and for all I know, the base EPMA tables) and build Essbase apps that way.
    If you think there is overlap, I would agree with you, but you can see they really aren't the same.
    And do one really need Essbase Studio?^^^You don't have to use Studio to build Essbase databases. You can go hog-wild in EAS with SQL load rules if you want, although at some point it probably will be easier/more straightforward to build it in Studio. Although Studio has been mentioned as the replacement for EAS for some time, I suspect the effort required to build a database in Studio will keep EAS around for quite a while or Studio Lite will have to come out. There's a lot to be said (sometimes) for the amazing flexibility EAS/Essbase have -- Studio requires a more methodical approach and EPMA has a very formal set of standards and methods.
    Whew, I'm sorry, I wrote a book about this and I'll bet you get a bunch of differing opinions on this.
    If you're interested in Studio, you might do well to pick up a copy of Glenn Schwartzberg's "Look Smarter Than You Are with Oracle Essbase Studio 11". I receive not a penny from its sale although I was one of the copy editors (hey, I got a mention in the acknowledgements). It's a good book and an excellent introduction to the tool.
    Regards,
    Cameron Lackpour

  • DIfference between BW and R/3 Security

    Hi
    Please tell me whats the difference between BW and R/3 Security
    Thanks

    Hi,
    The main difference is that, in R/3 the first line of defence it S_TCODE, i mean its completely based on Transaction.
    Where as B/W is completely object based i.e, it deals with securing Infoobjetcs, Infocubes, ODS, BW Queries, etc....
    For more ingormation on BW Seecurity, please visit:
    http://www.*********************/bw_security/bw_security.htm
    Hope it helps.
    Please award points if it is useful.
    thanks & regards,
    santosh

  • Using EPMA to transfer data between HFM and Essbase on 11.1.1.3

    Can we use EPMA to transfer data between HFM application and Essbase cubes on Hyperion version 11.1.1.3?
    As far my understanding we can only link HFM and Essbase through EAL.
    I would be very keen to know from the audience if we can use EPMA to transfer data between HFM and Essbase
    Hyperion version 11.1.1.3
    Windows 2003 64-bit
    Regards
    Yogananda Bharadwaj

    Hi Yogananda,
    Check epma admin.pdf, page 439. Chapter 19 describes how to synchronize and map data between Hyperion applications, interface tables, and external files via EPMA Data Synchronization.
    Regards,
    Thanos

  • Difference between SYS and SYSTEM user

    Hi,
    Well, one of my colleagues have asked me the difference between SYS and SYSTEM user .. Normally these are the users which will be under the monitoring of the DBA .. So, how could I know the difference between these two users ..
    Please assist me
    Regards

    SYS is the owner of the database and the owner of the data dictionary.
    The objects belonging to SYS cannot be exported. But SYS has the SYSDBA privilege which SYSTEM doesn't.
    SYSTEM is a privileged administration user, and typically owns Oracle provided tables other than the dictionary.
    SYSDBA is not a role, it is a privilege. You'll find it in system_privilege_map, not in dba_roles.

  • Difference between admin and normal user

    Hi Community,
    how does the user right management works when an admin account is used? In Mac OSX an admin isn't really an admin account  because the user become prompted for the (admin) user password again if he require higher privileges. Microsoft implemented since Windows Vista a similar technique, an administrator account works with a normal user token and if higher privileges are needed, the user will get the UAC dialog to grant higher privileges. This is done by providing the user an admin token temporarily.
    Is this the same way Mac OSX works or is this done by a different technique?
    Thx & Bye Tom

    Hi MrHoffman
    MrHoffman wrote:
    For further reading and improving your knowledge security beyond "root" and "sudo", there are Apple's security guides and the US NSA/CIA operating system security configuration guides.  Both of these resources are a little dated, but the underpinnings of the operating system and its security have not changed significantly; what you learn will still be valid, though there can be some features of newer releases (such as the profile manager, the lack of installed Java) that might be useful.
    Thanks a lot. The link  to the Mac OS security configuration guide seems to be broken but I took a short look into the Linux guide and this is also very interesting, even if I'm not using Redhat but Debian.
    MrHoffman wrote:
    Wo ist die Diskussion, bitte?
    In de.comp.sys.mac.misc but only one posing is interesting:
    Message-ID: <[email protected]>
    And there is only the problem addressed about the difference between an users login shell and an interactive sub shell and how it could be used for privilege escalation by modifying the $PATH variable to execute malicious code with root privileges. I remember this on earlier days in Linux when the actual directory (.) was at the end of the $PATH variable. This could end in the same issue after all.
    Thx & Bye Tom

  • Difference between Communication and System User

    Hello All,
    I would like to know the difference between the Communication User and System User.
    Definition wise, Yes, I know what they are for?
    But My doubt is, why do we need a communication user type for RFC connections when we can use a System user.
    Why did SAP designed these two types of users?

    It's okay in my books for people to experience the internet as it is and not the way it was individually intended
    SU01Solution already solved the problem actually, but there are some very fine peripheral differences still between the user types.
    That is why asking a specific question and discussing it's merits / pro's and con's is the best approach and SAP also benefits from it.
    Another obvious difference if you do a simple search is that SYSTEM type users cannot issue SAP logon tickets.
    There are a few more but as I said these are peripheral and very use-case dependent... so SU01Solution needs to ask a proper and realistic question.
    ps: ST01 is not the answer here either...
    Cheers,
    Julius

  • Difference between Dialog and Background User

    Dear Sap Gurus,
    What is the difference between a Dialog user and a Background user. I have asked a specific role to be assigned to Auditors, but the consultants have said that they cannot grant that role because it will give access  to very sensitive data. They in turn suggested that they will create a background user with that role. 
    what is the  difference between a dialog user and a backgroud user and how it relates to sensitivity of data ?
    Thanks in advance,
    Diwakar

    Dialog user type is your "typical" user type for people who log in to SAP & use it in their day to day work.
    Background user is used to schedule batch & background jobs and basically run stuff in the background (hence the name).  The most important thing to know is that you cannot login with a Background user which renders the recommendation of your consultant rather irrelevant and given the required use of it, a demonstration that they may not quite know as much as they profess to do. 
    Each user type can only do what is defined by it's roles (in most cases).  If a role assigned to a dialog user gives access to very sensitive data then it will give the same access to a background user and this is not too hard to exploit.
    Furthermore, it is usually expected for auditors to have access to sensitive data (depending on what they are auditing) however they should only be displaying this data.  They need no change access, and should not be requesting it, a wide access display role covering functional & technical display roles & access to display table data should suffice for 99% of audits.  If someone suggests that this access can only be assigned to a background role then I am surprised unless there are some very specific circumstances.

  • Difference between service and communication user

    Hi,
    We ran into a big problem in our CRM system getting millions of Dynpro_Send_in_background dumps while processing inbound queues R3AD* from R/3 system to CRM. Lots of Updates getting failed with CRM_SCHEDLIN_UPDATE_DU function module while executing report LCRM_SCHEDLIN_DUU01.
    Error Details - CRM_ORDER_MISC 002: Error in updating object SCHEDLIN
    We posted to SAP as well but did not find root cause. SAP saying we need to change RFC user "S_ECC_PR0400" from Service user to Communication user, that would stop the dump problem.
    I want to know what is the unique difference between these users(Service & Comm) which will resolve the dump problem though I know the common difference between these users.
    Thanks
    Anju

    Hi Anju ,
    Communication 'C' User :
    Use the user type Communikation for dialog-free communication between systems (for RFC or CPIC service users of different applications, for example, ALE, Workflow, TMS ZBV).
    Dialog logon is not possible.
    Service 'S' User :
    A user of type Service is a dialog user available to a large anonymous set of users. It usually has closely-restricted authorizations.
    Service users are e.g. used for anonymous system access via an ITS service. You can change a session which began as an anonymous session with a service user into a personal session under a dialog user with an individual authentification.
    There is no check for obsolete/initial passwords at logon. Only the user administrator can change the password.
    Multiple logon is allowed.
    Hope this may help you.
    Thanks
    Gyan

  • Difference between UME and LDAP users

    Hi,
    I am facing a strange problem. In my Webdynpro application, I am accessing the portal user properties using the normal user management APIs. IUser object. On my local server, all the users are UME users and it runs fine.
    When I deployed my application on the central server which creates LDAP users by default, the code bombs saying the user is not authorized. When I recreate the user in UME, it is fine again. Are there APIs which I can use which work for both the user stores?
    Thanks in advance,
    Kiran

    Hi Kiran,
    I User object works for both the cases. Just try the below code.
    <%@ page import = "com.sap.security.api.IUser" %>
         private void getUser() {
              user = compRequest.getUser();
              userId = user.getUniqueID();
              userName = user.getUniqueName();
    It worked for me for getting the users from LDAP.
    Regards,
    Santhosh

  • Difference between Structural and Org. Based Security

    Hi
       Could anyone please explain the difference between Structural and Org. based security
    Also could anyone please point to relevant documents.
    Thanks

    Structural authorization:
    ex: assigning roles to position and not to userids.. Listed below are some links that may help you to get started in understanding "Structural authorization".
    http://www.sap-img.com/human/structural-authorization-vs-role-authorization.htm
    http://www.sap-press.de/katalog/buecher/inhaltsverzeichnis/gp/titelID-1071
    https://websmp205.sap-ag.de/~form/ehandler?_APP=00200682500000001337&_EVENT=DISPLAY&COURSE=ADM940
    HB

  • What is the main difference between menu_exits and user_exits

    what is the main difference between menu_exits and user_exits

    Hi,
    User Exits:
    A user exit is a three character code that instructs the system to access a program during system processing.
    SXX: S is for standard exits that are delivered by SAP. XX represents the 2-digit exit number.
    UXX: U is for user exits that are defined by the user. XX represents the 2-digit exit number
    Menu Exits:
    Menu exits add items to the pulldown menus in standard SAP applications. You can use these menu items to call up your own screens or to trigger entire add-on applications.
    SAP creates menu exits by defining special menu items in the Menu Painter. These special entries have function codes that begin with "+" (a plus sign). You specify the menu item’s text when activating the item in an add-on project.
    Regards,
    Priyanka.

  • Difference between ws_upload and gui_upload

    hi
    could anybody tell me
    what is the difference between ws_upload and gui_upload
    dont say ws_upload is 4.6c version and
    gui_upload is 4.7 version.
    there might be some difference na thats why they migrate it.
    could you plz tell me the differnce
    it ll very helpful to me
    thanx
    kals.

    Hi Kalyan,
    SAP 4.72 onwards system is unicode compliant.
    THE WS_DOWNLOAD and WS_UPLOAD function modules are not compatible for unicode systems.
    So it is replaced with this new FM GUI_UPLOAD.
    There is a SAP note on this issue  Note 992677 - FMs WS_DOWNLOAD & WS_UPLOAD incompatible for unicode systems
    regards,nishant
    please reward points if this helps.

  • Security Profiles - Difference between SYSTEM and TENANT admin user?

    Hi,
    In the OnDemand Enterprise workbook, some defualt security profiles have been configured.  This includes one called 'Tenant Admin'.   When I look in the system there is also a profiule called 'System Admin'.  Could somebody please explan the differences between system and tenant regarding these profiles?   I assume we shoul drarely use System Admin, and Tenant Admin is the safer option?
    Thanks
    John

    Hi,
    As you mentioned there are 2 status can be maintained for documents like Equipment Master, Notification, Maintenance Order & other important business documents.
    In case, client feels that system status is not enough to capture the details of the object, then user status can be used.
    System statuses will be updated automatically based on business transactions which will be done on SAP.
    For example, once the equipment is created, System status would CRTD (Created). If you install the same to some superior equipment or FL, then status would be INST (Installed).
    If you keeping that equipment in Spare, then for that, you have to maintain separate User Status like AVLB (Available in Stock / Spare) so that through IH08, by using User status, you can the report which is available as spare.
    These user status as per the name, should be updated by the user manually.
    Regards,
    Maheswaran.

Maybe you are looking for

  • Is there any way to create discussion board using JSP

    Hi! i'm doing a project using jsp is there any way to create a simple discussion board like the one here? can anyone who knows pls forward some links that teaches me how to do it step by step. Thanks for your help and have a nice day :)

  • Fastest way to create child class from parent?

    As the subject states, what do you folks find is fastest when creating child classes directly from the parent? (esp. when the parent is in a lvlib) I thought I'd post up and ask because the fastest way I've found to get working takes a few steps. Any

  • Using mysqli in PHP 5.3.10

    I am using OS X Lion 10.7.4. I want to use mysqli API in my PHP script, but the manual says I have to install it. Plaese tell me how to install it

  • Code for Percentage Display of Loading Own Content

    I need an AS3 code for an external AS file that would provide the percentage of loading the content of its own swf ( library assets, etc ) and NOT external files. And then, after the loading is complete, it should add an instance of the main MovieCli

  • I want to update my apps but i cant log out of my kids account off my phone?

    My kid is logged in to my iphone and I created my own account and want to update apps. When it asks to update it still brings up my sons Apple ID account. How do I put mine on. I have already created one and looks like I am logged in but still does t