To ensure overall safe deployment of P6 EPPM, you should carefully plan security for all components, such as database servers and client computers that are required for and interact with P6 EPPM. In addition to the documentation included with other applications and hardware components, follow the P6 EPPM-specific guidance below.
Administrative Privileges Needed for Installation and Operation
Minimum Client Permissions Needed for P6 and P6 Team Member Web
Minimum Client Permissions Needed for P6 Professional
Physical Security Requirements for P6 EPPM
Application Security Settings in P6 EPPM
Files to Protect after Implementation
Legal Notices
Copyright © 1999, 2017,
Oracle and/or its affiliates. All rights reserved.
Last Published Friday, February 09, 2018