How to Set up the User POV in Web Analysis report

Hi , I am new to create the Hyperion Web Analysis report.
I am trying to set up the user POV. I have followed the document and did the below steps.
1. I went to User preference -> OLAP Server -->checked the BOX "Save Filters only for POV".
2. selected the layout and in options checked the Use user POV.
after that I have opened the report in HTML. nothing got prompted.
When I opened the Financial report, It will prompt user to select the year, period, entity, etc... I need the same way in Web Analysis also.
I have selected Accounts in rows, Entity, Year, Period in columns , rest all i kept in Filters.
Could some one please help me how user can get prompted to select the members from dimensions.
Thanks

What you have in Webanalysis is POV and PV
Applying Point of View (POV)
Selecting Personal Variables
You can also look at Oracle - Hyperion Labs......: WebAnalysis - how to show the current user's report when he logs in to see how PV can be leveraged.
There is no prompt option in WebAnalysis
Regards
Celvin
http://www.orahyplabs.com

Similar Messages

  • POV and User POV in Web Analysis 9.3

    Hi,
    I am a bit confused with POV and User POV in Web Analysis 9.3.1. I have a few web analysis dashboard to be used by several different groups of users. I use the admin to go in and for each of the report, I set whether need to use User POV (in data layout option) and/or use POV (the POV is activated in the database connection).
    However, I use the other user id (no the admin) to login and go to each of the dashboard, such settings of using User POV and/or POV are not valid. I wonder which setting I can set so that all the user will inherit the POVs setting from the default one.
    Since I have too many users, I can not use each user id and password to do such settings individually.
    Any recommendations? Thanks in advance.

    If your chart's selections and therefore it's colors are basically static, try creating the legend by hand.
    Our users requested that the Legends be different than what we could get it to display so I turned off the Legend and created my own. Since the colors on my graph don't change I was able to hard-code the legend. Place a new, small panel inside your chart where you want the Legend to be. Then create colored squares using MS Paint (fill a square then Colors | Edit Colors to specify the exact RGB) that match the colors of each bar/pie slice and insert them as Images on the panel. Re-size so they're small. Then create a text box next to each color for your Legend text.
    Then enable a Line Border on the panel & that should do it. Right click on your chart and choose Send To Back so the Legend is on top.
    My legend is in a panel beneath the chart (not inside it) but the above steps should work for what you need.
    Be sure when you view this on whatever your standard resolution is such as 1024 X 768 that the legend & titles appear where you want them, otherwise move things around until it's satisfactory.
    Good Luck,
    Karen Smejkal

  • How to set  the Common Pov in Web Analysis

    Dear All,
    Can any one tell me how to set the common Pov for two diffrent reports underon data source in the Web analysis.

    How could it not be 5A?. If you have A for each member and then you select 5 members you are going to get 5A. If you don't want 5A then what do you want the Avg of A across the 5 members?
    The tools are working the way they are designed to, your requirement is a little out of the ordinary. Unfortunately, Web Analysis does not have conditional logic.
    Try taking my previous suggestion and adding another member in Essbase called "Count", make it dynamic calc and the formula should be ' 1; '
    The purpose here is to get a value of one in the count member for each member you are going to select in your filter. So, if you select five members in the filter, Web Analysis will now return 5A and it will return the result of "Count" which will be 5. Create a calculated member that divides the 5A value by the count value 5. That will give you the average A for the 5 members, then you can divide by 12.

  • How to customize the error messages in web analysis reports

    Does anyone know how to customize the error messages that web analysis shows ,
    I want to customize the below error message with a custom error message
    "Document does not exist or no authorization to open document.Error occurred while loading document"
    Does anyone know how to do this ?

    Rajesh,
    you may want to check these links
    How to the Change the Application Stopped Message
    How to Change the Dispatcher Running, No Server Connected Message
    http://help.sap.com/saphelp_nw70/helpdata/en/65/18fc3f9ec4e669e10000000a155106/frameset.htm
    Thanks
    Bala Duvvuri

  • How to define User POV on web analysis

    Hi All,
    I got trouble on how to set user POV, i would like to set up User POV so that desired member will be selected in combo box during different user login. There is 1xx user accounts waiting me to set it up...
    Pls help....

    The import for WA users is notoriousl falkey, we had a 200 user system and unfortuantely had to do manually as the XML import just woudl not update them. Haven't tried in v9 yet, so could be fixed. See documentation it describes the file format pretty well.
    Hope this helps
    Andy King
    http://www.analitica.co.uk

  • How do we pass the user id and password in report URL

    We have one report. The URL of report is as below
    https://secure-ausomxapa.crmondemand.com/OnDemand/user/analytics/saw.dll?Go&Path=%2fshared%2fCompany_30145_Shared_Folder%2fDinesh%2fuser+prompt+test&Options=rfd&Action=Prompt
    I want to configure this in my custom application. Every time when the page executes it ask for username and password. Is there any way to pass the user id and password information through URL parameter?
    I have come across the fact, we can pass this in URL by appending the below parameter at end of URL
    &NQUser=user1&NQPassword=rock.
    But some how this is not working for me, and I am getting the error message –
    You are not authorized to view this page
    Any thought on this?

    Kdinesh,
    I know to add a username when you bookmark you favourites is it ?userid={loginID}, perhaps try this instead. I've never done it for password though.
    cheers
    alex

  • How to arrange page dropdowns in the Web Analysis report

    Hello, Experts!
    I have created a Web Analysis document based on my Esssbase cube. This document contains just one grid with 7 dropdowns. All dropdowns are in one line above and they are narrowed so as they all fit into 1 line within the screen and I cannot see the full names of members within a dropdown. So I need advice on how I can arrange the dropdowns in my Web Analysis report so that I can see the full names of members when opening the dropdown? Thank you so much!

    Thanks a lot! Yes, it works if one creates dropdowns via combo box controls attached to the same data source as the spreadsheet and applying these controls via the service button control (in this case you do not create page dropdowns in the data layout window of the spreadsheet and leave them in the data layout window's Filter pane). Otherwise it is impossible to edit the size and position of page dropdowns created in the Data Layout window of the spreadsheet.

  • I need to set up 12 iPad 3s to train groups of teachers in one-day workshops.  Any suggestions as to how to set up the iPads for multiple users?

    I have 12 iPad 3s that I want to set up to train multiple groups of teachers on in anticipation of purchasing classroom sets eventually.  I am looking for suggestions in how to set up the iPads to be used by multiple users.

    Managing Multiple iPads/iPods in a School Setting
    http://courses.moodleshare.com/course/view.php?id=162
     Cheers, Tom

  • HT201342 How can I change the USER of my i-cloud address? My 12 year old set up the e-mail account and used a silly user name (like: turtle!!). I would like to have an icloud e-mail account but under my own user name. The other /old name can be deleted?

    How can I change the USER name of my i-cloud e-mail account? It was set up by my son and he used a silly / embarrassing user name. I would like to change this name OR set up another i-cloud e-mail account under my own name / reference. Help?

    iCloud email addresses can't be changed or deleted, but you can set up an alias namethat he can use which will be linked to his current iCloud account and will receive email in the existing iCould inbox.  This guide explains how: http://support.apple.com/kb/PH2622.

  • How to find out the user-exits?

    hi.
    how to find out the user-exits?
    regards
    eswar.

    Hi,
    *& Report  ZEXITFINDER
    *report  zexitfinder.
    *& Enter the transaction code that you want to search through in order
    *& to find which Standard SAP User Exits exists.
    *& Tables
    tables : tstc, "SAP Transaction Codes
    tadir, "Directory of Repository Objects
    modsapt, "SAP Enhancements - Short Texts
    modact, "Modifications
    trdir, "System table TRDIR
    tfdir, "Function Module
    enlfdir, "Additional Attributes for Function Modules
    tstct. "Transaction Code Texts
    *& Variables
    data : jtab like tadir occurs 0 with header line.
    data : field1(30).
    data : v_devclass like tadir-devclass.
    *& Selection Screen Parameters
    selection-screen begin of block a01 with frame title text-001.
    selection-screen skip.
    parameters : p_tcode like tstc-tcode obligatory.
    selection-screen skip.
    selection-screen end of block a01.
    *& Start of main program
    start-of-selection.
    Validate Transaction Code
    select single * from tstc
    where tcode eq p_tcode.
    Find Repository Objects for transaction code
    if sy-subrc eq 0.
    select single * from tadir
    where pgmid = 'R3TR'
    and object = 'PROG'
    and obj_name = tstc-pgmna.
    move : tadir-devclass to v_devclass.
    if sy-subrc ne 0.
    select single * from trdir
    where name = tstc-pgmna.
    if trdir-subc eq 'F'.
    select single * from tfdir
    where pname = tstc-pgmna.
    select single * from enlfdir
    where funcname = tfdir-funcname.
    select single * from tadir
    where pgmid = 'R3TR'
    and object = 'FUGR'
    and obj_name = enlfdir-area.
    move : tadir-devclass to v_devclass.
    endif.
    endif.
    Find SAP Modifactions
    select * from tadir
    into table jtab
    where pgmid = 'R3TR'
    and object = 'SMOD'
    and devclass = v_devclass.
    select single * from tstct
    where sprsl eq sy-langu
    and tcode eq p_tcode.
    format color col_positive intensified off.
    write:/(19) 'Transaction Code - ',
    20(20) p_tcode,
    45(50) tstct-ttext.
    skip.
    if not jtab[] is initial.
    write:/(95) sy-uline.
    format color col_heading intensified on.
    write:/1 sy-vline,
    2 'Exit Name',
    21 sy-vline ,
    22 'Description',
    95 sy-vline.
    write:/(95) sy-uline.
    loop at jtab.
    select single * from modsapt
    where sprsl = sy-langu and
    name = jtab-obj_name.
    format color col_normal intensified off.
    write:/1 sy-vline,
    2 jtab-obj_name hotspot on,
    21 sy-vline ,
    22 modsapt-modtext,
    95 sy-vline.
    endloop.
    write:/(95) sy-uline.
    describe table jtab.
    skip.
    format color col_total intensified on.
    write:/ 'No of Exits:' , sy-tfill.
    else.
    format color col_negative intensified on.
    write:/(95) 'No User Exit exists'.
    endif.
    else.
    format color col_negative intensified on.
    write:/(95) 'Transaction Code Does Not Exist'.
    endif.
    Take the user to SMOD for the Exit that was selected.
    at line-selection.
    get cursor field field1.
    check field1(4) eq 'JTAB'.
    set parameter id 'MON' field sy-lisel+1(10).
    call transaction 'SMOD' and skip first screen.
    Regards

  • How to set up for user's request to go through a specific module that i selected

    I am testing if it is possible all requests from users should go through a module
    that i made or not.
    For example, all most web server is setted all requests should go through the
    log module for writing log when users request a certain page.
    Like this, how to set up the configuration all request should go through a certain
    module.
    Would you tell me the answer please.

    Power on the Time Capsule for a few minutes, then hold in the reset button firmly with a ball point pen or something similar for 10 seconds and release. Allow a full minute for the Time Capsule to restart to a slow, blinking amber light.
    Connect an Ethernet cable from one of the LAN <--> Ethernet ports on the back of the Uverse router to the WAN "O" port on the Time Capsule
    On your Mac, open up Macintosh HD > Applications > Utilities > AirPort Utility
    Click on the Other WiFi Devices tab
    Click on the Time Capsule
    The setup utility will open up automatically and take a minute to analyze the connections then suggest a setup on a screen that looks like this:
    Type in a simple name that you want to use for the Wireless Network Name
    Type in a name that you want to use for the Time Capsule device
    Type in a password
    Verify the password
    Click Next
    The utility will set everything up for you in a minute or two. When you see the message of Setup Complete on the screen, click Done
    You can now log onto the wireless network that you created by selecting the name and entering the password
    Post back on your progress and we will next get backups going again

  • Hyperion Financial Reporting is taking long time to show the User POV

    Hi,
    we are using the HFR (version 9.3.1.2) and when i double click on any report in the workspace it is taking 5 minutes to show me the User POV. Can any one of you let me know how to find where the issue is.
    Regards,
    VJ

    Hi VJ
    Things that I am aware of that can slow down reports are:
    1. Lots of members on the page (HFR tries to bring all the data into memory when run to speed up data display when changing from page to page)
    2. Nesting of attributes (due to dynamic nature of calculations)
    3. Nesting of dynamic calcs (similar to above)
    If you have any of the above that could be your issue although it sounds like it may be more a hardware issue than an issue with the reports themselves. Does it always take that long? even if you re-run a report that has been run before?
    Regards
    Stuart

  • How to Set up the  variables and others to compile and Run Java Programs

    Hello,
    I have just downloaded the jdk1.6.0_07 and jre1.6.0_07 and installed it in C:\Program files\Java in my Windows XP ,So please tell me how to sett up the enviroment variables etc to compile and run Java Programs from Command Prompt.
    thanks

    To set the PATH permanently, add the full path of the jdk1.6.0_<version>\bin directory to the PATH variable. Typically this full path looks something like C:\Program Files\Java\jdk1.6.0_<version>\bin. Set the PATH as follows on Microsoft Windows:
    1. Click Start > Control Panel > System on Windows XP or Start > Settings > Control Panel > System on Windows 2000.
    2. Click Advanced > Environment Variables.
    3. Add the location of bin folder of JDK installation for PATH in User Variables and System Variables. A typical value for PATH is:
    C:\Program Files\Java\jdk1.6.0_<version>\bin

  • Noise on the photo. How to set up the camera?

    Noise on the photo. How to set up the camera?
    Phone has become worse to do a pictures. A lot of noise on the photo. Often photo obtained not clear, smeared. I've heard that i can configure through iTunes. But I do not know how?? Or tell me another way to set up and adjust the camera.
    All updates are installed.
    I have the iPhone 5 (Just 5)

    OS X was designed long before the advent of SSD and the built in assumption is that everything would exist on the boot drive. If you want to change that, you'll need to do it manually. If I had an iMac with an SSD (a MBA has become my main computer) I'd leave the OS and applications on it and move at least some of my files to the standard hard drive - certainly all the media (music and video).
    The techs I work with have been arguing (politely) about the benefits of their own setups. One moved the entire User's directory to the standard drive. Copy your files by dragging, open Groups & Users in the System Preferences, option click on each account name and then point to the new location of the user's directory. Test that it works before deleting the directory from the SSD.
    The other kept his Users directory on the SSD but moved everything but the Library folder, then he put aliases of the folders into his user directory and dragged new folders into the Finder window sidebar. His argument is that many programs keep a hefty number of files in the Application Support folder and keeping them on the SSD lets the program start faster. Since I've not done any testing I can't say yes or no.

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •     &#61601;        B_BUPA_GRP
    •     &#61601;        B_BUPA_ATT
    •     &#61601;        B_BUPA_FDG
    •     &#61601;        B_BUPA_RLT•       
    Authorization objects for relationships:
    •     &#61601;        B_BUPR_BZT
    •     &#61601;        B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •     &#61601;        The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •     &#61601;        If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •     &#61601;        You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •     &#61601;        So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

Maybe you are looking for

  • Looking for App/Setting for Messages/Mail password protection

    Well its a bit simply really, I am just looking for something that will allow me to password protect mainly my messages, although it would be nice if i could password protect other apps or things on my phone, but its mainly for messages Is there some

  • Can't connect to vpn server

    I am now setting up the vpn server using mac mini with Mac OSX v 10.7 Lion Server. After setting up, I found that I can't make connection. When I check out the console, I find that the vpnd continue assign IP address to the same client and then hungu

  • Getting list of tables the user has access to across different schemas.

    Hi, I have to get the list of tables that an User has access to. I tried the below code. It takes a very long time. Is there any way in which I can specify the user name and get all the tables that he has access to? I know that we can use dbMetadata.

  • How to add new attribute as descrition to 0Material infoobject?

    Hi BI Gurus, I am trying to add a new attribute to 0MATERIAL. The new attribute called Z_DESC which will be displayed as Material Description. My problem is how can I get Material long description show on this new added attribute. Since the master da

  • New Insignia NS-L55X-10A sound not in sync with surround sound

    My new Insingina NS L55X 10A was delivered this morning, replacing a 7 year old 52" Hitachi.  Of course they just swapped the TV's, plugged it up and attached the cable coax and made sure it would turn on.  I didn't notice until they left, but the so