SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
REMINDER
Check in on the
COLLABORATE mobile app
Multi-Project Security Exception
Reports
Prepared by:
Robert C Monks, PMP
President & CEO
Monks Project Solutions
Keeping Your Users Happy and Your
Data Safe
Session ID#: 15463
Abstract
■ Managing project security permissions in PCM can be a
daunting task, and the software doesn't make it any
easier. This presentation shows how custom reports can
be used to audit user security, if you administer a PCM
solution. Solutions will be demonstrated using both
InfoMaker and BI Publisher making the content valuable
to a wide audience of PCM administrators. Participants
will be offered the opportunity to receive the reports
demonstrated.
Presenting Today
■ Robert Monks
▪ Project Management Institute, Project Management Professional
▪ Oracle University Certified P6 and PCM Instructor
▪ Oracle Certified P6 Implementation Consultant
▪ Oracle Certified PCM Implementation Consultant
▪ FAA Certificated Commercial Pilot, Instrument Airplane
▪ FAA Certificated Instrument Flight Instructor
▪ Father of two amazing daughters (Mary, 24 and Emily, 22)
▪ Husband of an amazing wife of 25 years (Cate)
▪ President & CEO of Monks Project Solutions
Monks Project Solutions
■ Oracle Gold Partner
■ Established in 1985
■ Primavera Partner since 1987
■ Located in Denver, Colorado
■ Providing value driven, sustainable organizational change
▪ Aligning people, process and technology
Security in Primavera Contract
Management
Security Overview
■ Access Templates
■ User Settings
■ Project Assignments
PCM Security
PCM Security
PCM Security
PCM Security
Access Templates
■ Contain permissions for modules
■ Process permissions
■ Approval authority and monetary limits
User Accounts
■ Are assigned a company abbreviation and initials
■ Are assigned user level access privileges
■ Are assigned access templates
■ Are assigned projects using an associated access template
Projects
■ Have a project administrator assigned
■ Have users with access rights from an access template
■ Can have user access permissions which differ from the
applied access template
■ Can further restrict a user’s access by company abbreviation
What Could Possibly Go Wrong?
Project Security Exposure Points
■ Incorrect access template assigned to project
■ Project access rights not aligned with access template
▪ Access template changed, but not reapplied to all project
assignments
▪ Access rights subsequently modified for a user on one or more
individual projects
■ Failure to assign company restrictions after assigning project
and template in PCM Administration module
■ Mismatch between company abbreviation in user account
and company restriction assigned at project
■ Project administrators gone wild
Requirements to Manage Project Security
■ We need to know what users are assigned to what projects
and which access templates users are assigned
■ We need to know what privileges each access template
confers upon a user
■ We need to know which project access privileges differ from
the assigned privileges from the access template
Security Exception Reports
Standard Security Reports Available in PCM
■ Details Security Report (r_sec_login_group_report_01)
■ Security Access Report (r_sec_access_report_01)
Standard Security Reports Available in PCM
(cont.)
■ Details Security Report (r_sec_login_group_report_01)
▪ Accessed from the PCM Administration module
▪ Reports on all projects assigned to a user
▪ Does NOT show the access template used
▪ Shows NOTHING about the access granted to the project
Existing Details Security Report
r_sec_login_group_report_01
Standard Security Reports Available in PCM
(cont.)
■ Security Access Report (r_sec_access_report_01)
▪ Accessed from the PCM Projects module
▪ Reports on all rights granted to each user on a project
▪ Prints one page per user per project
▪ Single Project Report therefore, must be run for each project
▪ Provides no easy way to compare project rights versus access
template rights
Existing Security Access Report
(r_sec_access_report_01)
Existing Security Access Report
(r_sec_access_report_01)
So How Did We Improve These Reports?
Improved Details Security Report
■ Modified existing report’s Data Model to include
▪ Security table
▪ User_Projects table
■ Added group_name field to SELECT statement
▪ aliased as template_name
■ Added template_name to existing report body
Improved Details Security Report
with linked access template shown
What Did We Change?
■ Original Data Model
SELECT LOGIN_NAME,
SECURITY_VIEW.GROUP_NAME,
SECURITY_VIEW.PROJECT_NAME,
GROUP_PROJECTS.PROJECT_TITLE
FROM SECURITY_VIEW,
GROUP_PROJECTS
WHERE SECURITY_VIEW.USER_NAME = :USER_NAME
AND GROUP_PROJECTS.project_name =
SECURITY_VIEW.PROJECT_NAME
ORDER BY LOGIN_NAME
What Did We Change?
■ Revised Data Model
SELECT V.LOGIN_NAME, V.GROUP_NAME, V.PROJECT_NAME, G.PROJECT_TITLE,
s.group_name AS template_name
FROM SECURITY_VIEW as V, GROUP_PROJECTS as G,
SECURITY as s,
USER_PROJECTS as u
WHERE V.USER_NAME = ‘:USER_NAME AND G.project_name = V.PROJECT_NAME
AND G.group_name = V.group_name
AND u.group_project_key = v.group_name + '_' + v.project_name
AND u.user_name = v.user_name
AND u.template_key = s.master_key
ORDER BY V.LOGIN_NAME
New Template Access Report
r_template_access_report_01
■ Modeled from Security Access Report
▪ Copied Report and Data Model
▪ Changed Data Model to select Template rows, not Project rows
■ Original Report used SECURITY_VIEW
■ Revised Report uses SECURITY
■ Original Report was project specific and linked users to
projects
■ Revised report selects
▪ WHERE is_template = 1
New Details Security Report for Templates
New Template Project Differences Report
■ New report, entirely build from scratch
■ Links each user’s project permissions back to the current
template definition assigned to that project and reports any
discrepancies
▪ Checks every module’s permissions
▪ Checks every processes permission
▪ Checks approval permissions and monetary limits
■ Reports any assignment whose template begins with “Ext-”
and doesn’t have a company restriction
▪ This implements a “Best Practice” for beginning all templates for
external users with “Ext-” and all templates for internal users
with an “Int-”
▪ May be disabled if this isn’t applicable to your situation
New Template Project Differences Report
(cont.)
■ Does not attempt to identify the discrepancy—merely reports
on it.
Use Cases for the New Template Project
Differences Report
■ Useful for identifying cases where an access template has
been modified and needs to be pushed out to users
▪ This is the Update Users feature in PCM 14.x
▪ Must be accomplished manually in PCM 13.1
■ Useful for identifying cases where a user’s assignment has
been modified subsequently so that it no longer matches the
standard template
■ Useful for identifying cases where a user (by virtue of his
access template) should be restricted by company, but isn’t
■ Useful for identifying a disconnect between the user’s
company abbreviation in his or her user account and the
company restriction abbreviation in an individual project
security assignment
Template/Project Security Differences Report
Template/Project Security Differences Report
(cont.)
■ Multi-Project Report
■ Does NOT observe PCM Project Security
▪ Will report on project exceptions—even if the user doesn’t have
rights to see those projects
▪ This seems a minor security risk, but judge for yourself
Have We Satisfied Our Defined
Requirements to Manage Project Security?
☑ We need to know what
users are assigned to what
projects and which access
templates users are
assigned
☑ We need to know what
privileges each access
template confers upon a
user
☑ We need to know which
project access privileges
differ from the assigned
privileges from the access
template
Applying this Concept to Other
Areas of PCM
Can We Apply to Other Areas of PCM?
■ Consistency and uniformity
are desirable in database
applications
■ Exception reports help
identify deviations from
standards
▪ Non-standard data
▪ Missing data
Create Multi-Project Exception Reports
■ Companies missing
▪ A Key Contact
▪ A Tax ID Number
■ Contacts missing
▪ Email address
▪ Mobile phone number
▪ Address information
■ Unapproved
▪ Budgeted Contracts
▪ Committed Contracts
▪ Purchase Orders
▪ Change Orders
■ Malformed Cost Codes
Questions?
■ Robert Monks
■ Rmonks@monks.com
■ 303-860-8870
Contact Information
Please complete the session
evaluation
We appreciate your feedback and insight
Session ID#: 15463
You may complete the session evaluation either
on paper or online via the mobile app

Mais conteúdo relacionado

Mais procurados

Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering arvind pandey
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1Mohammed Romi
 
Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Drusilla918
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introductionVishal Singh
 
Software Engineering - Ch7
Software Engineering - Ch7Software Engineering - Ch7
Software Engineering - Ch7Siddharth Ayer
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3Siddharth Ayer
 
Software systems engineering PRINCIPLES
Software systems engineering PRINCIPLESSoftware systems engineering PRINCIPLES
Software systems engineering PRINCIPLESIvano Malavolta
 
Non-Functional Requirements Are Important (with Explanatory Notes)
Non-Functional Requirements Are Important (with Explanatory Notes)Non-Functional Requirements Are Important (with Explanatory Notes)
Non-Functional Requirements Are Important (with Explanatory Notes)Stephen Booth MIET MBCS OLA
 
Software Engineering Diversity
Software Engineering DiversitySoftware Engineering Diversity
Software Engineering DiversitySayedMokarrom
 
Software Engineering unit 2
Software Engineering unit 2Software Engineering unit 2
Software Engineering unit 2Abhimanyu Mishra
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notesAmmar Shafiq
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 

Mais procurados (20)

Unit 1-overview of software engineering
Unit 1-overview of software engineering Unit 1-overview of software engineering
Unit 1-overview of software engineering
 
Ian Sommerville, Software Engineering, 9th Edition Ch1
Ian Sommerville,  Software Engineering, 9th Edition Ch1Ian Sommerville,  Software Engineering, 9th Edition Ch1
Ian Sommerville, Software Engineering, 9th Edition Ch1
 
Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...
 
Software engineering introduction
Software engineering introductionSoftware engineering introduction
Software engineering introduction
 
Software Engineering - Ch7
Software Engineering - Ch7Software Engineering - Ch7
Software Engineering - Ch7
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
 
Design patterns
Design patternsDesign patterns
Design patterns
 
Slides chapter 1
Slides chapter 1Slides chapter 1
Slides chapter 1
 
Ch7
Ch7Ch7
Ch7
 
Software systems engineering PRINCIPLES
Software systems engineering PRINCIPLESSoftware systems engineering PRINCIPLES
Software systems engineering PRINCIPLES
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Non-Functional Requirements Are Important (with Explanatory Notes)
Non-Functional Requirements Are Important (with Explanatory Notes)Non-Functional Requirements Are Important (with Explanatory Notes)
Non-Functional Requirements Are Important (with Explanatory Notes)
 
Use case diagrams
Use case diagramsUse case diagrams
Use case diagrams
 
software engineering
software engineeringsoftware engineering
software engineering
 
Software Engineering Diversity
Software Engineering DiversitySoftware Engineering Diversity
Software Engineering Diversity
 
Software Engineering unit 2
Software Engineering unit 2Software Engineering unit 2
Software Engineering unit 2
 
Popular Pitfalls In Sdlc Phases 1
Popular Pitfalls In Sdlc Phases 1Popular Pitfalls In Sdlc Phases 1
Popular Pitfalls In Sdlc Phases 1
 
Software engineering lecture notes
Software engineering   lecture notesSoftware engineering   lecture notes
Software engineering lecture notes
 
Ch1 introduction
Ch1 introductionCh1 introduction
Ch1 introduction
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 

Semelhante a Multi project security exception reports - Oracle Primavera P6 Collaborate 14

Multi project security exception reports - Oracle Primavera P6 Collaborate 14
Multi project security exception reports  - Oracle Primavera P6 Collaborate 14Multi project security exception reports  - Oracle Primavera P6 Collaborate 14
Multi project security exception reports - Oracle Primavera P6 Collaborate 14p6academy
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking SystemBharat Kalia
 
UniqueSoft Overview
UniqueSoft OverviewUniqueSoft Overview
UniqueSoft Overviewbmskelly
 
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...IBM Rational software
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principlessaurabhshertukde
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notesSiva Ayyakutti
 
Impact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top PracticesImpact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top PracticesBrian Petrini
 
SE - Lecture 2 - SW Devl Process.pptx
SE - Lecture 2 - SW Devl Process.pptxSE - Lecture 2 - SW Devl Process.pptx
SE - Lecture 2 - SW Devl Process.pptxTangZhiSiang
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentortmbainjr131
 
Performance Testing
Performance TestingPerformance Testing
Performance TestingvodQA
 
Platform Security IRL: Busting Buzzwords & Building Better
Platform Security IRL:  Busting Buzzwords & Building BetterPlatform Security IRL:  Busting Buzzwords & Building Better
Platform Security IRL: Busting Buzzwords & Building BetterEqual Experts
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )eshtiyak
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship managementRohit Gupta
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisHitesh Jangid
 
HCI U-II HCI software Process (1).pdf
HCI U-II HCI software Process (1).pdfHCI U-II HCI software Process (1).pdf
HCI U-II HCI software Process (1).pdfudhayaveenaa
 

Semelhante a Multi project security exception reports - Oracle Primavera P6 Collaborate 14 (20)

2-models.pptx
2-models.pptx2-models.pptx
2-models.pptx
 
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
Multi project security exception reports  - Oracle Primavera P6 Collaborate 14Multi project security exception reports  - Oracle Primavera P6 Collaborate 14
Multi project security exception reports - Oracle Primavera P6 Collaborate 14
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking System
 
UniqueSoft Overview
UniqueSoft OverviewUniqueSoft Overview
UniqueSoft Overview
 
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
 
Software engineering lecture notes
Software engineering lecture notesSoftware engineering lecture notes
Software engineering lecture notes
 
Impact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top PracticesImpact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top Practices
 
Software models
Software modelsSoftware models
Software models
 
SE - Lecture 2 - SW Devl Process.pptx
SE - Lecture 2 - SW Devl Process.pptxSE - Lecture 2 - SW Devl Process.pptx
SE - Lecture 2 - SW Devl Process.pptx
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
Performance Testing
Performance TestingPerformance Testing
Performance Testing
 
Platform Security IRL: Busting Buzzwords & Building Better
Platform Security IRL:  Busting Buzzwords & Building BetterPlatform Security IRL:  Busting Buzzwords & Building Better
Platform Security IRL: Busting Buzzwords & Building Better
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship management
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
 
The process
The processThe process
The process
 
Software engineering the process
Software engineering the processSoftware engineering the process
Software engineering the process
 
HCI U-II HCI software Process (1).pdf
HCI U-II HCI software Process (1).pdfHCI U-II HCI software Process (1).pdf
HCI U-II HCI software Process (1).pdf
 

Mais de p6academy

Oracle OpenWorld 2015
Oracle OpenWorld 2015Oracle OpenWorld 2015
Oracle OpenWorld 2015p6academy
 
Plan and Execute the Right Projects— Easily and Affordably
Plan and Execute the Right Projects—  Easily and AffordablyPlan and Execute the Right Projects—  Easily and Affordably
Plan and Execute the Right Projects— Easily and Affordablyp6academy
 
What's New In Primavera P6 EPPM 17.1
What's New In Primavera P6 EPPM 17.1What's New In Primavera P6 EPPM 17.1
What's New In Primavera P6 EPPM 17.1p6academy
 
Oracle Primavera Unifier What's New in Release 16.2
Oracle Primavera Unifier What's New in Release 16.2Oracle Primavera Unifier What's New in Release 16.2
Oracle Primavera Unifier What's New in Release 16.2p6academy
 
Oracle What's New In Primavera P6 16.2
Oracle What's New In Primavera P6 16.2Oracle What's New In Primavera P6 16.2
Oracle What's New In Primavera P6 16.2p6academy
 
What's New in Primavera Prime 16.1
What's New in Primavera Prime 16.1What's New in Primavera Prime 16.1
What's New in Primavera Prime 16.1p6academy
 
What's New in Primavera Gateway 16.1
What's New in Primavera Gateway 16.1What's New in Primavera Gateway 16.1
What's New in Primavera Gateway 16.1p6academy
 
What's New In Primavera Analytics 16.1
What's New In Primavera Analytics 16.1What's New In Primavera Analytics 16.1
What's New In Primavera Analytics 16.1p6academy
 
What's New in Unifier 16.1
What's New in Unifier 16.1What's New in Unifier 16.1
What's New in Unifier 16.1p6academy
 
20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktopp6academy
 
Oracle Primavera P6 16.1 Announced
Oracle Primavera P6 16.1 AnnouncedOracle Primavera P6 16.1 Announced
Oracle Primavera P6 16.1 Announcedp6academy
 
Oracle Primavera Unifier 16.1
Oracle Primavera Unifier 16.1Oracle Primavera Unifier 16.1
Oracle Primavera Unifier 16.1p6academy
 
P6 Release 8 Application Considerations Overview
P6 Release 8 Application Considerations OverviewP6 Release 8 Application Considerations Overview
P6 Release 8 Application Considerations Overviewp6academy
 
Administering Users, Access and Views in P6 EPPM (Web) Release 8 and later
Administering Users, Access and Views in P6 EPPM  (Web) Release 8 and laterAdministering Users, Access and Views in P6 EPPM  (Web) Release 8 and later
Administering Users, Access and Views in P6 EPPM (Web) Release 8 and laterp6academy
 
P6 Release 8 Installation Orientation
P6 Release 8 Installation OrientationP6 Release 8 Installation Orientation
P6 Release 8 Installation Orientationp6academy
 
Oracle Primavera P6 R8 Release Value Proposition
Oracle Primavera P6 R8 Release Value PropositionOracle Primavera P6 R8 Release Value Proposition
Oracle Primavera P6 R8 Release Value Propositionp6academy
 
Oracle Primavera P6 v7 Release Value Proposition
Oracle Primavera P6 v7 Release Value Proposition Oracle Primavera P6 v7 Release Value Proposition
Oracle Primavera P6 v7 Release Value Proposition p6academy
 
Oracle Primavera P6 Release Content Document (RCD)
Oracle Primavera P6 Release Content Document (RCD)Oracle Primavera P6 Release Content Document (RCD)
Oracle Primavera P6 Release Content Document (RCD)p6academy
 
Oracle Support Accreditation – Level 1 Study Guide
Oracle Support Accreditation – Level 1 Study GuideOracle Support Accreditation – Level 1 Study Guide
Oracle Support Accreditation – Level 1 Study Guidep6academy
 
Oracle Primavera Support Accreditation Study Guide
Oracle Primavera Support Accreditation Study GuideOracle Primavera Support Accreditation Study Guide
Oracle Primavera Support Accreditation Study Guidep6academy
 

Mais de p6academy (20)

Oracle OpenWorld 2015
Oracle OpenWorld 2015Oracle OpenWorld 2015
Oracle OpenWorld 2015
 
Plan and Execute the Right Projects— Easily and Affordably
Plan and Execute the Right Projects—  Easily and AffordablyPlan and Execute the Right Projects—  Easily and Affordably
Plan and Execute the Right Projects— Easily and Affordably
 
What's New In Primavera P6 EPPM 17.1
What's New In Primavera P6 EPPM 17.1What's New In Primavera P6 EPPM 17.1
What's New In Primavera P6 EPPM 17.1
 
Oracle Primavera Unifier What's New in Release 16.2
Oracle Primavera Unifier What's New in Release 16.2Oracle Primavera Unifier What's New in Release 16.2
Oracle Primavera Unifier What's New in Release 16.2
 
Oracle What's New In Primavera P6 16.2
Oracle What's New In Primavera P6 16.2Oracle What's New In Primavera P6 16.2
Oracle What's New In Primavera P6 16.2
 
What's New in Primavera Prime 16.1
What's New in Primavera Prime 16.1What's New in Primavera Prime 16.1
What's New in Primavera Prime 16.1
 
What's New in Primavera Gateway 16.1
What's New in Primavera Gateway 16.1What's New in Primavera Gateway 16.1
What's New in Primavera Gateway 16.1
 
What's New In Primavera Analytics 16.1
What's New In Primavera Analytics 16.1What's New In Primavera Analytics 16.1
What's New In Primavera Analytics 16.1
 
What's New in Unifier 16.1
What's New in Unifier 16.1What's New in Unifier 16.1
What's New in Unifier 16.1
 
20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop
 
Oracle Primavera P6 16.1 Announced
Oracle Primavera P6 16.1 AnnouncedOracle Primavera P6 16.1 Announced
Oracle Primavera P6 16.1 Announced
 
Oracle Primavera Unifier 16.1
Oracle Primavera Unifier 16.1Oracle Primavera Unifier 16.1
Oracle Primavera Unifier 16.1
 
P6 Release 8 Application Considerations Overview
P6 Release 8 Application Considerations OverviewP6 Release 8 Application Considerations Overview
P6 Release 8 Application Considerations Overview
 
Administering Users, Access and Views in P6 EPPM (Web) Release 8 and later
Administering Users, Access and Views in P6 EPPM  (Web) Release 8 and laterAdministering Users, Access and Views in P6 EPPM  (Web) Release 8 and later
Administering Users, Access and Views in P6 EPPM (Web) Release 8 and later
 
P6 Release 8 Installation Orientation
P6 Release 8 Installation OrientationP6 Release 8 Installation Orientation
P6 Release 8 Installation Orientation
 
Oracle Primavera P6 R8 Release Value Proposition
Oracle Primavera P6 R8 Release Value PropositionOracle Primavera P6 R8 Release Value Proposition
Oracle Primavera P6 R8 Release Value Proposition
 
Oracle Primavera P6 v7 Release Value Proposition
Oracle Primavera P6 v7 Release Value Proposition Oracle Primavera P6 v7 Release Value Proposition
Oracle Primavera P6 v7 Release Value Proposition
 
Oracle Primavera P6 Release Content Document (RCD)
Oracle Primavera P6 Release Content Document (RCD)Oracle Primavera P6 Release Content Document (RCD)
Oracle Primavera P6 Release Content Document (RCD)
 
Oracle Support Accreditation – Level 1 Study Guide
Oracle Support Accreditation – Level 1 Study GuideOracle Support Accreditation – Level 1 Study Guide
Oracle Support Accreditation – Level 1 Study Guide
 
Oracle Primavera Support Accreditation Study Guide
Oracle Primavera Support Accreditation Study GuideOracle Primavera Support Accreditation Study Guide
Oracle Primavera Support Accreditation Study Guide
 

Último

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 

Último (20)

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 

Multi project security exception reports - Oracle Primavera P6 Collaborate 14

  • 1. REMINDER Check in on the COLLABORATE mobile app Multi-Project Security Exception Reports Prepared by: Robert C Monks, PMP President & CEO Monks Project Solutions Keeping Your Users Happy and Your Data Safe Session ID#: 15463
  • 2. Abstract ■ Managing project security permissions in PCM can be a daunting task, and the software doesn't make it any easier. This presentation shows how custom reports can be used to audit user security, if you administer a PCM solution. Solutions will be demonstrated using both InfoMaker and BI Publisher making the content valuable to a wide audience of PCM administrators. Participants will be offered the opportunity to receive the reports demonstrated.
  • 3. Presenting Today ■ Robert Monks ▪ Project Management Institute, Project Management Professional ▪ Oracle University Certified P6 and PCM Instructor ▪ Oracle Certified P6 Implementation Consultant ▪ Oracle Certified PCM Implementation Consultant ▪ FAA Certificated Commercial Pilot, Instrument Airplane ▪ FAA Certificated Instrument Flight Instructor ▪ Father of two amazing daughters (Mary, 24 and Emily, 22) ▪ Husband of an amazing wife of 25 years (Cate) ▪ President & CEO of Monks Project Solutions
  • 4. Monks Project Solutions ■ Oracle Gold Partner ■ Established in 1985 ■ Primavera Partner since 1987 ■ Located in Denver, Colorado ■ Providing value driven, sustainable organizational change ▪ Aligning people, process and technology
  • 5. Security in Primavera Contract Management
  • 6. Security Overview ■ Access Templates ■ User Settings ■ Project Assignments
  • 11. Access Templates ■ Contain permissions for modules ■ Process permissions ■ Approval authority and monetary limits
  • 12. User Accounts ■ Are assigned a company abbreviation and initials ■ Are assigned user level access privileges ■ Are assigned access templates ■ Are assigned projects using an associated access template
  • 13. Projects ■ Have a project administrator assigned ■ Have users with access rights from an access template ■ Can have user access permissions which differ from the applied access template ■ Can further restrict a user’s access by company abbreviation
  • 14. What Could Possibly Go Wrong?
  • 15. Project Security Exposure Points ■ Incorrect access template assigned to project ■ Project access rights not aligned with access template ▪ Access template changed, but not reapplied to all project assignments ▪ Access rights subsequently modified for a user on one or more individual projects ■ Failure to assign company restrictions after assigning project and template in PCM Administration module ■ Mismatch between company abbreviation in user account and company restriction assigned at project ■ Project administrators gone wild
  • 16. Requirements to Manage Project Security ■ We need to know what users are assigned to what projects and which access templates users are assigned ■ We need to know what privileges each access template confers upon a user ■ We need to know which project access privileges differ from the assigned privileges from the access template
  • 18. Standard Security Reports Available in PCM ■ Details Security Report (r_sec_login_group_report_01) ■ Security Access Report (r_sec_access_report_01)
  • 19. Standard Security Reports Available in PCM (cont.) ■ Details Security Report (r_sec_login_group_report_01) ▪ Accessed from the PCM Administration module ▪ Reports on all projects assigned to a user ▪ Does NOT show the access template used ▪ Shows NOTHING about the access granted to the project
  • 20. Existing Details Security Report r_sec_login_group_report_01
  • 21. Standard Security Reports Available in PCM (cont.) ■ Security Access Report (r_sec_access_report_01) ▪ Accessed from the PCM Projects module ▪ Reports on all rights granted to each user on a project ▪ Prints one page per user per project ▪ Single Project Report therefore, must be run for each project ▪ Provides no easy way to compare project rights versus access template rights
  • 22. Existing Security Access Report (r_sec_access_report_01)
  • 23. Existing Security Access Report (r_sec_access_report_01)
  • 24. So How Did We Improve These Reports?
  • 25. Improved Details Security Report ■ Modified existing report’s Data Model to include ▪ Security table ▪ User_Projects table ■ Added group_name field to SELECT statement ▪ aliased as template_name ■ Added template_name to existing report body
  • 26. Improved Details Security Report with linked access template shown
  • 27. What Did We Change? ■ Original Data Model SELECT LOGIN_NAME, SECURITY_VIEW.GROUP_NAME, SECURITY_VIEW.PROJECT_NAME, GROUP_PROJECTS.PROJECT_TITLE FROM SECURITY_VIEW, GROUP_PROJECTS WHERE SECURITY_VIEW.USER_NAME = :USER_NAME AND GROUP_PROJECTS.project_name = SECURITY_VIEW.PROJECT_NAME ORDER BY LOGIN_NAME
  • 28. What Did We Change? ■ Revised Data Model SELECT V.LOGIN_NAME, V.GROUP_NAME, V.PROJECT_NAME, G.PROJECT_TITLE, s.group_name AS template_name FROM SECURITY_VIEW as V, GROUP_PROJECTS as G, SECURITY as s, USER_PROJECTS as u WHERE V.USER_NAME = ‘:USER_NAME AND G.project_name = V.PROJECT_NAME AND G.group_name = V.group_name AND u.group_project_key = v.group_name + '_' + v.project_name AND u.user_name = v.user_name AND u.template_key = s.master_key ORDER BY V.LOGIN_NAME
  • 29. New Template Access Report r_template_access_report_01 ■ Modeled from Security Access Report ▪ Copied Report and Data Model ▪ Changed Data Model to select Template rows, not Project rows ■ Original Report used SECURITY_VIEW ■ Revised Report uses SECURITY ■ Original Report was project specific and linked users to projects ■ Revised report selects ▪ WHERE is_template = 1
  • 30. New Details Security Report for Templates
  • 31. New Template Project Differences Report ■ New report, entirely build from scratch ■ Links each user’s project permissions back to the current template definition assigned to that project and reports any discrepancies ▪ Checks every module’s permissions ▪ Checks every processes permission ▪ Checks approval permissions and monetary limits ■ Reports any assignment whose template begins with “Ext-” and doesn’t have a company restriction ▪ This implements a “Best Practice” for beginning all templates for external users with “Ext-” and all templates for internal users with an “Int-” ▪ May be disabled if this isn’t applicable to your situation
  • 32. New Template Project Differences Report (cont.) ■ Does not attempt to identify the discrepancy—merely reports on it.
  • 33. Use Cases for the New Template Project Differences Report ■ Useful for identifying cases where an access template has been modified and needs to be pushed out to users ▪ This is the Update Users feature in PCM 14.x ▪ Must be accomplished manually in PCM 13.1 ■ Useful for identifying cases where a user’s assignment has been modified subsequently so that it no longer matches the standard template ■ Useful for identifying cases where a user (by virtue of his access template) should be restricted by company, but isn’t ■ Useful for identifying a disconnect between the user’s company abbreviation in his or her user account and the company restriction abbreviation in an individual project security assignment
  • 35. Template/Project Security Differences Report (cont.) ■ Multi-Project Report ■ Does NOT observe PCM Project Security ▪ Will report on project exceptions—even if the user doesn’t have rights to see those projects ▪ This seems a minor security risk, but judge for yourself
  • 36. Have We Satisfied Our Defined Requirements to Manage Project Security? ☑ We need to know what users are assigned to what projects and which access templates users are assigned ☑ We need to know what privileges each access template confers upon a user ☑ We need to know which project access privileges differ from the assigned privileges from the access template
  • 37. Applying this Concept to Other Areas of PCM
  • 38. Can We Apply to Other Areas of PCM? ■ Consistency and uniformity are desirable in database applications ■ Exception reports help identify deviations from standards ▪ Non-standard data ▪ Missing data
  • 39. Create Multi-Project Exception Reports ■ Companies missing ▪ A Key Contact ▪ A Tax ID Number ■ Contacts missing ▪ Email address ▪ Mobile phone number ▪ Address information ■ Unapproved ▪ Budgeted Contracts ▪ Committed Contracts ▪ Purchase Orders ▪ Change Orders ■ Malformed Cost Codes
  • 40. Questions? ■ Robert Monks ■ Rmonks@monks.com ■ 303-860-8870 Contact Information
  • 41. Please complete the session evaluation We appreciate your feedback and insight Session ID#: 15463 You may complete the session evaluation either on paper or online via the mobile app