Safe Deployment of P6 EPPM

Previous TopicNext TopicContents

To ensure overall safe deployment of P6 EPPM, you should carefully plan security for all components, such as database servers and client computers that are required for and interact with P6 EPPM. In addition to the documentation included with other applications and hardware components, follow the P6 EPPM-specific guidance below.

Related Topics

Administrative Privileges Needed for Installation and Operation

Minimum Client Permissions Needed for P6 and P6 Team Member Web

Minimum Client Permissions Needed for P6 Professional

Physical Security Requirements for P6 EPPM

Application Security Settings in P6 EPPM

Files to Protect after Implementation



Legal Notices
Copyright © 1999, 2015, Oracle and/or its affiliates. All rights reserved.

Last Published Wednesday, July 29, 2015

PDF Library