Role based data asssignement and Data security has a lot of importance in Planning arena. Insuring that users have access to information only relevant to thier role, in one hand ensures efficient execution and on other hand it privdes security of information too. Eevn a compromise of a size of an ant in Planning data can lead to an impact on the Execution front of a size of an elephant. Hence the need of having a secure user management functionality is a must to have in all the Planning Solutions.
Demantra application has quite a flexible but strong user based data security system in place. It provides you control to grant access to users based on thier responsbilties and roles. The access control is not only applicable to data but can also be tailored for Menus, Programs and Applications. Using security option provided at User creation level and at Portal access levels, you can easily configure a well protected and secure collaborative planning environment.
Data Secutiry:Data in Demantra is partitioned by Components and users have access to only one Component. Each user is granted access to a part of data of a component. Ex. with two mutualy exclusive components X and Y, user defined in component X, cannt get access to data belonging to Component Y. Every component has an owner, who acts as Administrator for the component and has control on it's data access.
Components are defined to partition data, by Series, Levels, Indexes, UOMs, etc., and controls what you see as a user in the worksheets. Only entities selected in Componenet definition are visible and avaialble for the users of the respective component.
Feature Secutiry:Access to Menu options, programs, applications and modules is restricted based on Permission levels defined for user. It empowers administrator to control access to all the Menus avaialble in Demantra. E.g. A causal user when logs into "Business Modeler" can see only Password change menu option, while a System Manager user, can view most of the administrative options, when he logs into the same application. Menu items available in Collaborator Workbench can be controled at various levels like at USer level, at USer Group level etc.
User Managment:Users within Demantra are created in "Business Modeler" application, using Menu option:"Security > Create/Modify User". You can create user with specific permission levels based on their role. A user can be created with access to only specific set of modules, eg. A Demand Planner user needs to have access to may be only Collaborator Workbench. Unlike Oracle Demand Planning(ODP), you have to just do distribution of data only once for a user. You can grant access based on user's role by selecting only particular level members of a level. E.g. A Sales Representative would like to work only his account and might want to view other few accounts as well. In this scenario, you assign a particular account level member to him with Full Access and you assign other level members of account level, with access Read Only. You can create User Groups for ease of collaboration, alert notifications, and enabling security.
EBS-Demantra integrated environment: In an integrated environment, you can configure SSO(Single Sign On) for Demantra for easy switching to Demantra application from EBS application. Once SSO is setup, users created in Oracle EBS with Demantra responsibilities assigned to them are mirrored automatically in Demantra application. This ensures that if you while working on EBS, click on Demand Management Workbench link to open Demantra Collaborator workbench, then application will directly log you into the Demantra environment. In absence of SSO setup, users see Demantra Log In window, when they try to launch Demantra applications from EBS.
For more detailed explanation and setup understanding on this topic, you should refer to "Implementation guide" of Demantra, available in Oracle Metalink.
3 comments:
Can anyone recommend the robust Endpoint Security system for a small IT service company like mine? Does anyone use Kaseya.com or GFI.com? How do they compare to these guys I found recently: N-able N-central security management
? What is your best take in cost vs performance among those three? I need a good advice please... Thanks in advance!
Thanks for giving such a deep knowledge about the data security. It is very important in planning arena.we need to insure that users ave right access to information relevant to their role only. I need to implement in my project with my guys. thanks again.
sap erp financials
Post a Comment