{"id":3453,"date":"2023-04-12T15:33:17","date_gmt":"2023-04-12T15:33:17","guid":{"rendered":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/"},"modified":"2026-01-21T16:30:45","modified_gmt":"2026-01-21T16:30:45","slug":"utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics","status":"publish","type":"post","link":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/","title":{"rendered":"How can you use an alternate hierarchy to manage security in IBM Planning Analytics?"},"content":{"rendered":"<p>IBM\u00a0Planning Analytics\u00a0(PA)\u00a0allows administrator\u00a0(admin)\u00a0users to control\u00a0users\u2019 read and write access through\u00a0different levels of\u00a0object security.\u00a0The system provides a set of redefined\u00a0groups for admin purposes but allows\u00a0custom groups to be created as well that users can belong to.\u00a0Planning Analytics admins commonly use security\u00a0controls\u00a0to limit\u00a0users\u2019\u00a0access to elements within a dimension. This can be done by\u00a0setting a security group\u2019s access to READ, WRITE or NONE and then assigning specific users as members to these defined groups.\u00a0However,\u00a0manually creating security groups can be time consuming and require upkeep in the future.<\/p>\n<p>Here we will describe a technique using PA rules\u00a0on\u00a0element security control cubes\u00a0to make\u00a0security\u00a0maintenance\u00a0much more efficient\u00a0by\u00a0applying\u00a0security access only to\u00a0the\u00a0children (or grandchildren) of a specific element.<\/p>\n<p>This\u00a0approach\u00a0will only\u00a0require\u00a0security groups\u00a0to be set up for\u00a0the parent element, one for\u00a0READ\u00a0access and one for\u00a0WRITE\u00a0access.\u00a0A rule\u00a0is\u00a0written\u00a0to give\u00a0READ\u00a0or\u00a0WRITE\u00a0access to\u00a0these defined groups\u00a0using\u00a0the \u2018ELISANC\u2019 function,\u00a0by\u00a0looking at the children of a specified consolidation. Once the rule is in place,\u00a0this security\u00a0method will\u00a0make life easier by\u00a0automatically\u00a0granting the correct security\u00a0access\u00a0based on the hierarchy\u00a0structure.<\/p>\n<p>Example Use Case<\/p>\n<p>We will illustrate this technique using an example\u00a0on a Location\u00a0dimension. In this example, the business requirement is that anyone who\u00a0has security access to a specific geographic\u00a0region,\u00a0should automatically have access to\u00a0all locations within that region, including to new locations that are added\u00a0as the business grows.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1700 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H1-min.jpg\" alt=\"\" width=\"298\" height=\"320\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1701 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H2-min.jpg\" alt=\"\" width=\"226\" height=\"450\" \/><\/p>\n<p><strong>Step 1:\u00a0Create\u00a0Alternate Hierarchy<\/strong><\/p>\n<p>Alternate hierarchies can be implemented by a\u00a0TurboIntegrator\u00a0(TI)\u00a0process or manually. They allow users to see alternate rollups of data in the cube. For example, the Location dimension\u00a0above\u00a0has a main hierarchy that shows locations rolled up by city to country and countries rolled up to a \u2018Total Location\u2019 element.\u00a0The\u00a0\u2018Total Location\u2019 hierarchy does not\u00a0allow us to see the United States (US) data rolled up individually by states. Without this information\u00a0(as if an attribute does not exist), we are not\u00a0able to\u00a0set security by state\u00a0because the elements have no defining characteristics to link them to a state. Creating\u00a0the\u00a0\u2018United States of America\u2019\u00a0alternate hierarchy\u2019s rollup\u00a0shows all US cities as children of their respective states.\u00a0Since this company\u2019s headquarters and\u00a0most of\u00a0its\u00a0offices are in\u00a0New\u00a0York\u00a0state\u00a0(NYS), we\u00a0will implement a security rule for all offices in\u00a0the\u00a0cities\u00a0within\u00a0NYS.\u00a0Although this hierarchy was generated from a TI\u00a0process,\u00a0an alternate hierarchy can\u00a0also\u00a0be\u00a0created\u00a0manually by copying and pasting elements in the\u00a0Dimension\u00a0Editor.<\/p>\n<p><strong>Step 2: Create New Security Group<\/strong><\/p>\n<p>We will\u00a0introduce the convention\u00a0that\u00a0security\u00a0group names\u00a0will\u00a0reflect\u00a0the access they permit:\u00a0\u201cR\u201d will represent read access and \u201cW\u201d will represent write access\u00a0which\u00a0will\u00a0be\u00a0attached to the group name.\u00a0As an example,\u00a0we\u00a0will\u00a0create two security groups for the New York\u00a0State\u00a0hierarchy, one for read access and one for write access.\u00a0We will call the read group \u201cLOCATIONR_NYS\u201d and the write group \u201cLOCATIONW_NYS\u201d.\u00a0Below\u00a0we\u00a0walk\u00a0through the steps of manually adding\u00a0security\u00a0groups\u00a0via Planning Analytics,\u00a0but another way\u00a0to\u00a0add groups\u00a0in PA\u00a0is\u00a0through\u00a0the\u00a0TI function\u00a0<a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=stf-addgroup\">\u2018ADDGROUP\u2019<\/a>\u00a0with syntax of\u00a0<a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=stf-addgroup\">ADDGROUP<\/a>(\u2018Group Name\u2019). Here\u2019s a link for some\u00a0PA\u00a0TI functions that\u00a0may\u00a0come in handy\u00a0when dealing with security:\u00a0<a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=tf-security-turbointegrator-functions\">https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=tf-security-turbointegrator-functions<\/a>.<\/p>\n<ol>\n<li>To add a new security group\u00a0in\u00a0Architect\u00a0right click on the server &gt; Security &gt; Clients\/Groups\u00a0to open the TM1 Clients\/Groups dialog box<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1702 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H3-min.jpg\" alt=\"\" width=\"456\" height=\"204\" \/><\/p>\n<ol start=\"2\">\n<li>Group &gt; Add New Group\u00a0to manually add the new security groups<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1703 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H4-min.jpg\" alt=\"\" width=\"382\" height=\"294\" \/><\/p>\n<ol start=\"3\">\n<li>The new\u00a0groups\u00a0in this example\u00a0are\u00a0\u2018LOCATIONW_NYS\u2019 (write group) and \u2018LOCATIONR_NYS\u2019\u00a0(read group).\u00a0When\u00a0done\u00a0adding\u00a0new groups,\u00a0always scroll to the right\u00a0of the interface\u00a0to make sure\u00a0the\u00a0groups have\u00a0successfully\u00a0been created then click \u201cOK\u201d.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1704 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H5-min.jpg\" alt=\"\" width=\"432\" height=\"162\" \/><\/p>\n<p><strong>Step 3:\u00a0Assign Group\u2019s Privileges<\/strong><\/p>\n<p>Now that the\u00a0security\u00a0groups have been created\u00a0on the server,\u00a0security\u00a0rights\u00a0need\u00a0to\u00a0be assigned to\u00a0each group\u00a0to\u00a0grant users\u00a0of the groups\u00a0access that\u00a0aligns\u00a0with the \u201cW\u201d and \u201cR\u201d naming conventions.\u00a0Read access granted\u00a0to a group\u00a0allows\u00a0users\u00a0of the group\u00a0see\u00a0data but not modify it, as write access enables modification by users.\u00a0In this case we want all children of the \u2018New York\u2019\u00a0element\u00a0to have\u00a0READ\u00a0and\u00a0WRITE\u00a0access\u00a0granted\u00a0to the\u00a0\u201cR\u201d\u00a0and\u00a0\u201cW\u201d\u00a0groups, respectively.\u00a0We could now manually\u00a0set\u00a0the access to the children of \u2018New York\u2019 to READ and WRITE, but instead\u00a0we will write a\u00a0Planning Analytics\u00a0rule attached to the \u2018}ElementSecurity_Location\u2019\u00a0cube\u00a0that will automate it for us.<\/p>\n<p>The\u00a0\u2018}ElementSecurity_Location\u2019\u00a0control cube\u00a0is a\u00a02-dimensional\u00a0cube\u00a0consisting of an intersection\u00a0between the location dimension and groups dimension\u00a0which allows us to assign groups\u00a0access\u00a0to\u00a0specific\u00a0elements in the location dimension.\u00a0The\u00a0cube can be found in the server explorer\u00a0as a control object which will only be\u00a0auto\u00a0generated if changes\u00a0have been\u00a0made to security of the location dimension.\u00a0If the\u00a0\u2018}ElementSecurity_Location\u2019 cube does not already exist, you can make a change in the \u201cElements Security Assignments\u2026\u201d to\u00a0auto\u00a0generate the cube or simply use the code\u00a0provided\u00a0below\u00a0to create the cube through the\u00a0<a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=functions-cubecreate\">\u2018CUBECREATE\u2019<\/a>\u00a0TI\u00a0function.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1705 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H6-min.jpg\" alt=\"\" width=\"382\" height=\"226\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1706 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H7-min.jpg\" alt=\"\" width=\"322\" height=\"154\" \/><\/p>\n<ol>\n<li>Right click on\u00a0\u2018}ElementSecurity_Location\u2019\u00a0cube\u00a0and create\/edit rule&#8230;<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1707 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H8-min.jpg\" alt=\"\" width=\"262\" height=\"180\" \/><\/p>\n<ol start=\"2\">\n<li>The below\u00a0PA\u00a0rules\u00a0will\u00a0assign\u00a0the\u00a0correct\u00a0privileges\u00a0to the groups if the element is a child of the\u00a0\u2018New York\u2019\u00a0hierarchy\u00a0by using \u2018IF\u2019 statements.\u00a0The rule looks for the\u00a0READ\u00a0and\u00a0WRITE\u00a0groups\u00a0we created above\u00a0by\u00a0a\u00a0<a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=trf-subst\">\u2018SUBST\u2019<\/a>function\u00a0and then assigns read or write access\u00a0according to group name\u00a0to all elements that have\u00a0\u2018New York\u2019 as their ancestor.\u00a0Although\u00a0the\u00a0<a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=eirf-elispar\">\u2018ELISPAR\u2019<\/a>\u00a0\u2019 TI function\u00a0would work here as well,\u00a0<a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=eirf-elisanc\">\u2018ELISANC\u2019<\/a>\u00a0will guarantee that if another level is added\u00a0to this hierarchy\u00a0in the future such as regions of the state, the leaf level elements will still be picked up. (Ex:\u00a0New York &gt; Western\u00a0New York\u00a0&gt; Buffalo, New York is an ancestor of\u00a0Buffalo,\u00a0but New York is not Buffalo\u2019s parent)<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1708 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H9-min.jpg\" alt=\"\" width=\"436\" height=\"388\" \/><\/p>\n<ol start=\"3\">\n<li>We can double check\u00a0the\u00a0}ElementSecurity_Location\u00a0cube to make sure the\u00a0rules are populating access correctly. As we see below, these groups only have\u00a0READ\u00a0or\u00a0WRITE\u00a0access to children of the \u2018New York\u2019\u00a0roll-up element.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1709 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H10-min.jpg\" alt=\"\" width=\"362\" height=\"468\" \/><\/p>\n<p><strong>Step 4:\u00a0Assign Users to Groups<\/strong><\/p>\n<p>With the groups created and their security privileges in place, users can be added to these groups\u00a0through the\u00a0}ClientGroups\u00a0cube.\u00a0This cube is 2 dimensions, one being the \u00a0}Clients\u00a0and the other being\u00a0the }Groups,\u00a0which allows us to\u00a0easily assign users while maintaining a familiar cube view\u00a0of rows and columns intersections.<\/p>\n<p>1. Open the }ClientGroups cube and chose the }Client element you\u2019d like to assign to the groups, and the }Group you\u2019re assigning<\/p>\n<p>2. Remove zero suppression and assign specified client to a group by typing in the group name at intersection of the relative group and client. For example, we will add Sal to the \u201cLOCATIONW_NYS\u201d group by typing \u201cLOCATIONW_NYS\u201d at the intersection of \u201cLOCATIONW_NYS\u201d and Sal in the cube view.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1710 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H11-min.jpg\" alt=\"\" width=\"340\" height=\"230\" \/><\/p>\n<ol start=\"3\">\n<li>We\u00a0now need to\u00a0<strong>Refresh Security\u00a0<\/strong>so the system can pick up on the adjustments we\u2019ve made. We will do this by right clicking on the sever &gt; Security &gt; Refresh Security<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1711 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H12-min.jpg\" alt=\"\" width=\"416\" height=\"124\" \/><\/p>\n<ol start=\"4\">\n<li>To verify results, sign in as a test user (Sal)\u00a0that is\u00a0assigned to one of the groups (LOCATIONW_NYS).\u00a0In the Subset Editor for the Location dimension, Sal will only be able to view elements that have New York as their ancestor. If\u00a0we\u00a0open\u00a0a cube\u00a0view\u00a0with the Location dimension,\u00a0Sal can only see\u00a0and\u00a0write to\u00a0data of\u00a0cities of New York.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1712 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H13-min.jpg\" alt=\"\" width=\"362\" height=\"351\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1713 alignnone\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H14-min.jpg\" alt=\"\" width=\"641\" height=\"306\" \/><\/p>\n<p>If a\u00a0TurboIntegrator\u00a0process is in place to define the\u00a0\u2018New York\u2019\u00a0hierarchy, a simple\u00a0execution\u00a0of the TI\u00a0process\u00a0and\u00a0<strong>Security Refresh\u00a0<\/strong>will\u00a0update\u00a0the security groups\u2019\u00a0rights to elements via our\u00a0security method\u00a0in the same step. If the\u00a0\u2018New York\u2019\u00a0hierarchy is maintained manually, the cities will need to be copied from the main hierarchy and pasted as children of \u2018New York\u2019, then a\u00a0<strong>Security Refresh\u00a0<\/strong>is needed to regenerate our methodology.\u00a0Having a\u00a0Planning Analytics\u00a0rule as the above in\u00a0place,\u00a0makes things\u00a0security\u00a0simple if we\u2019d like to apply the same privileges for each state.\u00a0That is, only giving \u201cLOCATIONW_<em>STATE<\/em>\u201d groups write access to the cities of the state in question.\u00a0The rule can simply be\u00a0added onto by\u00a0adjusting\u00a0by state name\u00a0in the groups and location element lookups\u00a0and of course, refreshing\u00a0security!<\/p>\n<p><strong>Ask\u00a0QueBIT<\/strong><\/p>\n<p>Want to discuss how best to perform other prototyping and development tasks within the PAW interface? Have a different question? You can always reach out to QueBIT at\u202f<a href=\"mailto:support@quebit.com\">support@quebit.com<\/a>\u202ffor\u00a0assistance.\u00a0We\u2019re\u00a0here to help!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IBM\u00a0Planning Analytics\u00a0(PA)\u00a0allows administrator\u00a0(admin)\u00a0users to control\u00a0users\u2019 read and write access through\u00a0different levels of\u00a0object security.\u00a0The system provides a set of redefined\u00a0groups for admin purposes but allows\u00a0custom groups to be created as well that users can belong to.\u00a0Planning Analytics admins commonly use security\u00a0controls\u00a0to limit\u00a0users\u2019\u00a0access to elements within a dimension. This can be done by\u00a0setting a security group\u2019s access&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[38,36,51],"class_list":["post-3453","post","type-post","status-publish","format-standard","hentry","category-ibm","tag-how-tos","tag-planning-analytics","tag-planning-analytics-how-tos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How can you use an alternate hierarchy to manage security in IBM Planning Analytics? - QueBIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How can you use an alternate hierarchy to manage security in IBM Planning Analytics? - QueBIT\" \/>\n<meta property=\"og:description\" content=\"IBM\u00a0Planning Analytics\u00a0(PA)\u00a0allows administrator\u00a0(admin)\u00a0users to control\u00a0users\u2019 read and write access through\u00a0different levels of\u00a0object security.\u00a0The system provides a set of redefined\u00a0groups for admin purposes but allows\u00a0custom groups to be created as well that users can belong to.\u00a0Planning Analytics admins commonly use security\u00a0controls\u00a0to limit\u00a0users\u2019\u00a0access to elements within a dimension. This can be done by\u00a0setting a security group\u2019s access&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"QueBIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T15:33:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-21T16:30:45+00:00\" \/>\n<meta name=\"author\" content=\"agoddard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"agoddard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/\"},\"author\":{\"name\":\"agoddard\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\"},\"headline\":\"How can you use an alternate hierarchy to manage security in IBM Planning Analytics?\",\"datePublished\":\"2023-04-12T15:33:17+00:00\",\"dateModified\":\"2026-01-21T16:30:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/\"},\"wordCount\":1505,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/H1-min.jpg\",\"keywords\":[\"How To\u2019s\",\"Planning Analytics\",\"Planning Analytics How To's\"],\"articleSection\":[\"IBM\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/\",\"name\":\"How can you use an alternate hierarchy to manage security in IBM Planning Analytics? - QueBIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/H1-min.jpg\",\"datePublished\":\"2023-04-12T15:33:17+00:00\",\"dateModified\":\"2026-01-21T16:30:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/H1-min.jpg\",\"contentUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/H1-min.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How can you use an alternate hierarchy to manage security in IBM Planning Analytics?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\",\"name\":\"QueBIT\",\"description\":\"QueBIT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/e52d72da0fd2f5f70d189343fe4f5084\",\"name\":\"agoddard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g\",\"caption\":\"agoddard\"},\"sameAs\":[\"https:\\\/\\\/quebit.com\\\/askquebit\"],\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/author\\\/agoddard\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How can you use an alternate hierarchy to manage security in IBM Planning Analytics? - QueBIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/","og_locale":"en_US","og_type":"article","og_title":"How can you use an alternate hierarchy to manage security in IBM Planning Analytics? - QueBIT","og_description":"IBM\u00a0Planning Analytics\u00a0(PA)\u00a0allows administrator\u00a0(admin)\u00a0users to control\u00a0users\u2019 read and write access through\u00a0different levels of\u00a0object security.\u00a0The system provides a set of redefined\u00a0groups for admin purposes but allows\u00a0custom groups to be created as well that users can belong to.\u00a0Planning Analytics admins commonly use security\u00a0controls\u00a0to limit\u00a0users\u2019\u00a0access to elements within a dimension. This can be done by\u00a0setting a security group\u2019s access&hellip;","og_url":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/","og_site_name":"QueBIT","article_published_time":"2023-04-12T15:33:17+00:00","article_modified_time":"2026-01-21T16:30:45+00:00","author":"agoddard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"agoddard","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/#article","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/"},"author":{"name":"agoddard","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084"},"headline":"How can you use an alternate hierarchy to manage security in IBM Planning Analytics?","datePublished":"2023-04-12T15:33:17+00:00","dateModified":"2026-01-21T16:30:45+00:00","mainEntityOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/"},"wordCount":1505,"commentCount":0,"image":{"@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H1-min.jpg","keywords":["How To\u2019s","Planning Analytics","Planning Analytics How To's"],"articleSection":["IBM"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/","url":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/","name":"How can you use an alternate hierarchy to manage security in IBM Planning Analytics? - QueBIT","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/#primaryimage"},"image":{"@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H1-min.jpg","datePublished":"2023-04-12T15:33:17+00:00","dateModified":"2026-01-21T16:30:45+00:00","author":{"@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084"},"breadcrumb":{"@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/#primaryimage","url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H1-min.jpg","contentUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2021\/09\/H1-min.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/quebit.com\/askquebit\/utilizing-an-alternate-hierarchy-for-security-in-ibm-planning-analytics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quebit.com\/askquebit\/"},{"@type":"ListItem","position":2,"name":"How can you use an alternate hierarchy to manage security in IBM Planning Analytics?"}]},{"@type":"WebSite","@id":"https:\/\/quebit.com\/askquebit\/#website","url":"https:\/\/quebit.com\/askquebit\/","name":"QueBIT","description":"QueBIT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quebit.com\/askquebit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/e52d72da0fd2f5f70d189343fe4f5084","name":"agoddard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d817b364cff1d66116debde8d1c85e5e76eeece9c5ae731b19276a6040231455?s=96&d=mm&r=g","caption":"agoddard"},"sameAs":["https:\/\/quebit.com\/askquebit"],"url":"https:\/\/quebit.com\/askquebit\/author\/agoddard\/"}]}},"_links":{"self":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/comments?post=3453"}],"version-history":[{"count":2,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3453\/revisions"}],"predecessor-version":[{"id":5117,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/3453\/revisions\/5117"}],"wp:attachment":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/media?parent=3453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/categories?post=3453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/tags?post=3453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}