In This Section:
Example 1: Users Require the Same Access to Databases
Example 2: Users Require Differing Access to Databases
Example 3: Users Require Differing Access to Databases; Users Will Be Added
Example 4: Users Require Differing Access to Application and Databases
The sample security problems and solutions described in this chapter are based on the Sample application and use security procedures described in User Management and Security in EPM System Security Mode.