Star Security Configuration

Previous TopicNext TopicContents

This section describes the Star security configuration. The steps include adding a new Star user, setting up security, and filtering out inactive resources.

In This Section

Adding a New User for P6 Analytics

P6 EPPM Privileges

Including Inactive Resources in the Star Tables



Legal Notices
Copyright © 1999, 2014, Oracle and/or its affiliates. All rights reserved.

Last Published Friday, January 31, 2014