- 1 Minute to read
- Print
- DarkLight
- PDF
Consolidation Security Overview
- 1 Minute to read
- Print
- DarkLight
- PDF
In the Consolidation Control Panel, access the Security task to setup security for Centralized and Decentralized users. A centralized user has access to all company members in a scenario. A decentralized user has access to specific dimension members only. The Company/Legal Entity Member Selector distinguishes between Centralized and Decentralized Consolidations. If you are at the root member (defined as the top member in the hierarchy), then you are interacting as a Centralized user managing the Consolidation Process in its entirety. If you have been provided specific member access within the hierarchy and you select a Company from the member selector, then you are interacting in Decentralized mode. This means that the modules available may be restricted and you may have limited access to Company intersections for modifying data.
To access Consolidation Security, navigate to Consolidation and click the Security link under the Administration pane. Or you can also find it under the User Actions section in Maintenance > Admin > User & Role Management.