Oracle® Hyperion Financial Management nbsp;· Oracle® Hyperion Financial Management Administrator's Guide Release 11.1.2.2. Financial Management Administrator's Guide, 11.1.2.2

  • Published on
    30-Jan-2018

  • View
    213

  • Download
    1

Embed Size (px)

Transcript

<ul><li><p>Oracle Hyperion Financial Management</p><p>Administrator's Guide</p><p>Release 11.1.2.2</p></li><li><p>Financial Management Administrator's Guide, 11.1.2.2</p><p>Copyright 2000, 2012, Oracle and/or its affiliates. All rights reserved.</p><p>Authors: EPM Information Development Team</p><p>Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respectiveowners.</p><p>This software and related documentation are provided under a license agreement containing restrictions on use anddisclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement orallowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit,perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilationof this software, unless required by law for interoperability, is prohibited.</p><p>The information contained herein is subject to change without notice and is not warranted to be error-free. If you findany errors, please report them to us in writing.</p><p>If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf ofthe U.S. Government, the following notice is applicable:</p><p>U.S. GOVERNMENT RIGHTS:</p><p>Programs, software, databases, and related documentation and technical data delivered to U.S. Government customersare "commercial computer software" or "commercial technical data" pursuant to the applicable Federal AcquisitionRegulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, andadaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, tothe extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, CommercialComputer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.</p><p>This software or hardware is developed for general use in a variety of information management applications. It is notdeveloped or intended for use in any inherently dangerous applications, including applications that may create a risk ofpersonal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take allappropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliatesdisclaim any liability for any damages caused by use of this software or hardware in dangerous applications.</p><p>This software or hardware and documentation may provide access to or information on content, products, and servicesfrom third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of anykind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsiblefor any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.</p></li><li><p>Documentation Accessibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15</p><p>Chapter 1. About Financial Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17</p><p>Financial Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17</p><p>Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18</p><p>Performance Management Architect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18</p><p>EPM Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18</p><p>Financial Management Dimensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18</p><p>Scenario Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19</p><p>Year Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19</p><p>Period Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19</p><p>Entity Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19</p><p>Value Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20</p><p>Account Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20</p><p>Intercompany Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20</p><p>View Dimension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20</p><p>Custom Dimensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21</p><p>User-Defined Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21</p><p>Chapter 2. Managing Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25</p><p>Application Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26</p><p>Creating Application Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27</p><p>Entering Languages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27</p><p>Defining Calendars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28</p><p>Editing Frequencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29</p><p>Editing Periods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30</p><p>Creating Custom Dimensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32</p><p>Saving Application Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33</p><p>Creating Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34</p><p>Registering Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35</p><p>Specifying Database Information for Extracting Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 36</p><p>Opening Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37</p><p>Closing Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37</p><p>Changing Application Server Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37</p><p>Viewing Application List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38</p><p>Deleting Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38</p><p>Loading Application Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38</p><p>Extracting Application Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39</p><p>Copying Classic Administration Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40</p><p>Contents iii</p></li><li><p>Copying Performance Management Architect Applications . . . . . . . . . . . . . . . . . . . . . . . 41</p><p>Copy as Classic Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42</p><p>Copy as Performance Management Architect When Source Application Exists atTarget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44</p><p>Using Sample Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46</p><p>Working with System Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47</p><p>Viewing and Printing System Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47</p><p>Deleting System Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47</p><p>System Message Detail Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48</p><p>Managing System Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48</p><p>Viewing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49</p><p>Logging Out Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49</p><p>Managing Servers and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50</p><p>Disabling and Enabling Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50</p><p>Synchronizing Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51</p><p>Auditing Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51</p><p>Auditing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54</p><p>Monitoring Running Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55</p><p>Scanning For and Clearing Invalid Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57</p><p>Changing Settings for Multiple Server Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57</p><p>Changing Settings for Unlocking Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58</p><p>Maintaining Server Logon Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59</p><p>Chapter 3. Managing Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61</p><p>Application Security Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62</p><p>Launching the Shared Services Console from Financial Management . . . . . . . . . . . . . . . . 62</p><p>Selecting Users and Groups for Assigning Security Classes . . . . . . . . . . . . . . . . . . . . . 63</p><p>Setting Up Security Classes for Financial Management Applications . . . . . . . . . . . . . . 63</p><p>Assigning User Access to Security Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65</p><p>Setting Up Email Alerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66</p><p>Running Security Reports for Financial Management Applications . . . . . . . . . . . . . . . 66</p><p>Loading Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67</p><p>Clearing and Loading Security Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68</p><p>Before Clearing Security Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68</p><p>After Clearing Security Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69</p><p>Extracting Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70</p><p>Chapter 4. Managing Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73</p><p>Defining Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74</p><p>Account Type Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76</p><p>iv Contents</p></li><li><p>Defining Dynamic Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78</p><p>Defining Custom Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78</p><p>Adding Custom Dimension Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80</p><p>Importing Custom Dimension Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80</p><p>Manually Editing Custom Dimension Information . . . . . . . . . . . . . . . . . . . . . . . . . . 81</p><p>Defining Entity Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82</p><p>Defining Scenario Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83</p><p>Defining Application Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85</p><p>Organization by Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87</p><p>Defining Consolidation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88</p><p>Using Consolidation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89</p><p>Assigning Consolidation Methods Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89</p><p>Using POWN or POWNMIN Consolidation Methods . . . . . . . . . . . . . . . . . . . . . . . 90</p><p>Defining Currencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91</p><p>Defining Cell Text Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93</p><p>System-Generated Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94</p><p>Consolidation Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94</p><p>Ownership Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95</p><p>Editing System-Generated Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96</p><p>Setting Up Intercompany Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96</p><p>Editing System-Generated ICP Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97</p><p>Editing System-Generated Value Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97</p><p>Metadata Filtering Based on Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98</p><p>Creating Metadata Files of the APP Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99</p><p>File Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100</p><p>Version . . . . . . . . . . . . . . . . . . . ....</p></li></ul>

Recommended

View more >