Consider user information needs when you plan how to set up security permissions. End your analysis with a list of users and permissions.
Use this checklist to plan for security:
Who are the users and what permissions should they have?
Who should have load data permissions?
Which users can be grouped, and as a group, given similar permissions?
See User Management and Security in EPM System Security Mode.