Skip to main content

OACS Essbase Security Filters


Setting up security filters manually and using Maxl script in OAC Essbase and assigning it to Users and Groups.

As you know security is most important thing in any field likewise in OACS also. So in this blog I will show you how to create security filter’s in OAC Essbase and restrict the user to see the data. I will be doing in two ways.
  • 1      Manually
  • 2      Using MaxL
So, let’s get started.
First let’s have a brief discussion about the Filter’s.
Filter are used to control security access over the cube data. It can be assigned to a user or group. Depending on the security role of a user determines whether you can create, assign, edit, copy, rename, or delete a filter.
Filters have two important things – Access and Member specification.

Access – Access are of four types in OAC Essbase

1.     None - No data can be retrieved or updated
2.     Read - Data can be retrieved but not updated
3.     Write - Data can be retrieved and updated
4.     MetaRead - Metadata (dimension and member names) can be retrieved and updated.

Member specification - Specify dimension or member names, alias names, member combinations, member sets that are defined by functions, or substitution variable names, which are preceded by an ampersand (&). Separate multiple entries with commas.
If you want to know more about the Filter’s, please go through Oracle documentation.

So let's create some filters.

·         First method is the manual method. So open up your OACS environment. Go to Application Tab


Then go to your Application->Database and Inspect.
·         After that go to Filter Tab.
·     Click to Add button  +   in the right corner. A window will be opened. Write your filter name at Textbox down the Filter Editor. Here I took “F1JanAct”.
·        



Here comes the interesting part assigning the Access to the members in the cube. In the right corner click the + Add button.
·     As you see the above image None row has been added. Now select the Access and the member specification. And Save it and Validate it. If some syntax or any other error is there, then it will be shown on the same window.
·         Now to assign this Filter to User or Groups. Click on Permissions.
·         Now Click at the right corner Add button   

·        In the Search bar type the User or Group name and select it. Assign it to the Filter. Close the window. Volla! Your filter is ready to use.
 Now let's jump to the second method i.e; Maxl script.
·        So first go to your OACS Essbase interface.
·        Go to your application database. Here its “RPTSBD22”. And click the Action button. And go to Inspect.

·        After clicking Inspect you will navigate to this page.
·       Now click the Add button at the left corner. You will be navigated to below page. Now enter the Filter name below the Script Editor. Here its “FilterCreate”. At the blank area enter your Maxl script. Now click Save and Close.
·       Here you can see FilterCreate Maxl has been created.

·       Similarly create one more Maxl to assign the filter to user. Here I named it “AssignFilter”.
·       Now to run the Maxl, we need to navigate to JOBS tab(See below image). Click “New Job” at the left corner. And click “Run Maxl”.
·       Now select the Application, Database and the filter. Click “OK”.
·       Note: First run the “FilterCreate” Maxl then after the “AssignFilter”.

If Job is successfully executed, the status of the job would be green. 
Congratulation you have successfully created and assigned Filters both manually and using Maxl.

Comments

  1. nicely explained the topic "Security Filters" same as you mention about is quite popular these days in the united kingdom, our company provides services for the same kindly visit to know more: Trust Service

    ReplyDelete
  2. A very good and informative article indeed . It helps me a lot to enhance my knowledge, I really like the way the writer presented his views. I hope to see more informative and useful articles in future. Inventory management software

    ReplyDelete

Post a Comment

Popular posts from this blog

Business Intelligence

Business Intelligence You must be wondering what is the above imageor title is about. Yeah, it is about the first project I get into. Where the client was using all the above process to generate a report, which will help them to manage their financial planning. So now you must be having an idea that what this blog is about i.e; using Business Intelligence, EPM, ETL and ERP how the financial decisions are taken. Here the client uses the different processes to achieve their goals. So let’s dive in and try to understand the process.  Note - In this blog, you will get an overview of each process and its high-level architecture. Enterprise Resource Planning -  Firstly let's start with  Enterprise resource planning (ERP),  most of the companies store data through ERP. It is a process whereby a company manages and integrates the important parts of its business. ERP system stores both operational and non – operational data. An ERP management information system int

Dimension in Database

Creating Dimensions in Database In the post will see how to create dimensions in your database.Here Essbase is already installed in the server. we just connecting to it. So hold on tight...  Creating Dimension in database - ·          Go to your Application -> Database -> Outline, ·          Right Click on Outline : <Database name> (Active Alias Table: Default) and select Add Child. Like this add as many dimension you want. Note that Only Dimension has to be created as of now. Members will be created in Rule File or right click dimension and click Add child . Save it!  

Docker with Essbase

Oracle Essbase with Docker What is Docker: Docker is a tool which put together an application and all its dependencies together in the form of containers. This containerization aspect of Docker ensures that the application works in any environment. Docker is an open – source project that automates the deployment of application inside software container. Docker containers wrap up a piece of software in a complete file system that contains everything it needs to run. Docker vs VMs with reference to Essbase: Traditionally we were using VMs, Following are some issues in VMs with compare to Docker. • Large image size: Essbase VMs tend to have in at 50-70GB, depending on what all is installed. • Difficulties starting up services: When moving between networks, such as from home to a client network to the coffee shop or wherever, I frequently run into networking issues that are hard to troubleshoot and usually resolved by restarting the entire VM (and hopin