Introduction
Security in Essbase is flexible enough to support very complicated applications with complex access requirements and restrictions. This flexibility will help a developer design an outline without having to create a very large distributed model for the same subject area. When we are developing an Essbase database, careful planning and leveraging of your security will prevent enormous amounts of maintenance going forward and keep the user experience as intuitive as possible by hiding the complexities in an Essbase outline. This task is accomplished by implementing effective group, role, and filter-level security. This chapter will not cover the whole of user and role security. For the complete User and Role Security Guide, visit http://docs.oracle.com/cd/E17236_01/epm.1112/hss_admin.pdf.