In this post, I will discuss Security and the role it has within HFM applications. I will show how to change user access for different Security Classes, and also how to create a new user in an application. Both of these topics are very significant for assigning accessibility to your new HFM application.

The Security Class within HFM is very important when setting up your new application. They allow you to specify who is allowed to see different things within the application. You can restrict which accounts someone has access to, which entities they can see, different scenarios they can look at, which Inter Company Partners they can see, and the access to different custom dimensions. After the Security Class has been associated with a certain dimension, you can assign the user privileges to those classes. This is done in Shared Services.

Image

Once in Shared Services, you can assign access control for users and determine which access type users can have per security class.

Image

The Default access type is None, meaning there is no security for that user with those Security Classes. There are five access types: None, Metadata, Read, Promote, and All.

Image

Since I am the Administrator User, I have set the access for all the classes to All.

Image

You can also create new users within the Shared Services Console. Right-click on User to pull up that option.

Image

Image

WEBINAR

Building to the ‘Top’ with OneStream: HFM Replacement Story

Once you have created the user, you need to assign it to an application. You do so by Right-clicking the user, and selecting Provisions.

MWSnap008

Then find and select the application you want to give the user access to.

MWSnap009

After you find the application, you must give the user a role. The role I gave User2 was the Consolidate All with Data Role.

MWSnap010

After you click OK, you will get a screen that tells you every role that has been assigned to that user.

MWSnap011

From there, you can determine which access to give the new user in the existing Security Classes.

MWSnap012

I gave User2 access to the US and EUROPE Security Classes.

MWSnap013

Now User2 will only be able to run Consolidate All with Data in those two Security Classes.

Share this

About the author

Philip Parker

The Pre-Transformation Checklist for Finance

An 11-Step Risk Reduction Tool for CFOs and CAOs Who Aren’t Sure Where to Start

By following this checklist, organizations can systematically approach their finance technology transformation, ensuring that all critical aspects are addressed and that the transition is smooth and successful.

Related posts you might like

Building to the ‘Top’ with OneStream: An HFM Replacement Story

View Post
CPM

An introduction to Corporate Performance Management Software (CPM)

View Post

HollandParker Named 2022 Power of the Platform Winner by OneStream

View Post

Privacy Policy

Introduction

Welcome to Holland Parker. We are committed to protecting your personal information and your right to privacy. If you have any questions or concerns about our policy or our practices with regard to your personal information, please contact us at [email protected].

Information We Collect

We collect personal information that you provide to us when expressing an interest in obtaining information about us or our products and services, when participating in activities on the website, or otherwise contacting us.

The personal information that we collect depends on the context of your interactions with us and the website, the choices you make, and the products and features you use. The personal information we collect can include the following:

  • Name and Contact Data: We collect your first and last name, email address, postal address, phone number, and other similar contact data.
  • Payment Data: We collect data necessary to process your payment if you make purchases, such as your payment instrument number (e.g., a credit card number), and the security code associated with your payment instrument.
  • Login Credentials: We collect passwords, password hints, and similar security information used for authentication and account access.
  • Other Information: We collect any other information you directly provide to us through our website.

How We Use Your Information

We use personal information collected via our website for a variety of business purposes described below. We process your personal information for these purposes in reliance on our legitimate business interests, in order to enter into or perform a contract with you, with your consent, and/or for compliance with our legal obligations.

We use the information we collect or receive:

  • To send administrative information to you.
  • To fulfill and manage your orders.
  • To post testimonials.
  • To request feedback.
  • To send you marketing and promotional communications.
  • To deliver targeted advertising to you.
  • For other business purposes.

Sharing Your Information

We may process or share your data that we hold based on the following legal basis:

  • Consent: We may process your data if you have given us specific consent to use your personal information for a specific purpose.
  • Legitimate Interests: We may process your data when it is reasonably necessary to achieve our legitimate business interests.
  • Performance of a Contract: Where we have entered into a contract with you, we may process your personal information to fulfill the terms of our contract.
  • Legal Obligations: We may disclose your information where we are legally required to do so in order to comply with applicable law, governmental requests, a judicial proceeding, court order, or legal process.
  • Vital Interests: We may disclose your information where we believe it is necessary to investigate, prevent, or take action regarding potential violations of our policies, suspected fraud, situations involving potential threats to the safety of any person, and illegal activities.

Cookies and Other Tracking Technologies

We may use cookies and similar tracking technologies to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Policy.

Data Security

We aim to protect your personal information through a system of organizational and technical security measures. We have implemented appropriate technical and organizational security measures designed to protect the security of any personal information we process.

Retention of Data

We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy policy unless a longer retention period is required or permitted by law.

Your Privacy Rights

In some regions, such as the European Economic Area (EEA), you have certain rights under applicable data protection laws. These may include the right to (i) request access and obtain a copy of your personal information, (ii) request rectification or erasure; (iii) restrict the processing of your personal information; and (iv) if applicable, to data portability.

Updates to This Policy

We may update this privacy policy from time to time in order to reflect changes to our practices or for other operational, legal, or regulatory reasons.

Contact Us

If you have questions or comments about this policy, you may contact us by email at [email protected].

The Pre-Transformation Checklist for Finance

Tap into wisdom gained through 300+ finance transformations to uncover answers to questions you have and those you should.

This field is for validation purposes and should be left unchanged.