Part IV: Designing and Building a Security System

This part describes how to control access to data in Essbase applications by designing and building a security system:




© 2002 Hyperion Solutions Corporation. All rights reserved.
http://www.hyperion.com