{"id":4065,"date":"2023-08-24T12:21:15","date_gmt":"2023-08-24T12:21:15","guid":{"rendered":"https:\/\/quebit.com\/askquebit\/?p=4065"},"modified":"2026-01-20T16:05:22","modified_gmt":"2026-01-20T16:05:22","slug":"cell-level-security-in-ibm-planning-analytics","status":"publish","type":"post","link":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/","title":{"rendered":"How Do I Use Cell-Level Security in IBM Planning Analytics?"},"content":{"rendered":"<p><strong>Cell Level Security<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4069 alignright\" src=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure-300x182.png\" alt=\"\" width=\"300\" height=\"182\" srcset=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure-300x182.png 300w, https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure.png 556w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Planning Analytics <strong>cell level security<\/strong> provides the ability to secure individual cells without the need for a complicated series of <strong>element-level<\/strong> security cubes, which sets control on cells in a cube identified by dimension elements. Cell-level security can add a more finite level of control to a cube but can also become cumbersome, as each cell within a cube requires its own security setting. Cell level security requires a cell security cube (}CellSecurity_cube_name) to be created for the cube to apply cell security on.<\/p>\n<p><strong>Creating a Cell Security Cube<\/strong><\/p>\n<p>A cell security cube can be created manually (right-click the cube and select \u201cSecurity\u201d, then \u201cCreate Cell Security Cube\u201d) or programmatically (using the <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=stf-cellsecuritycubecreate\"><strong>CellSecurityCubeCreate<\/strong>\u00a0<\/a>function). Using the <em>manual method<\/em> is easier (as long as you are a PA Administrator) and produces a cell security cube containing <u>all<\/u> of the dimensions of the target cube. This is preferred if your cell security requirements could evolve in the future to scenarios that possibly include combinations of all of the dimensions within the cube. If the cell security requirements are explicitly defined (and have a low probability of changing to include all of the dimensions), then the <em>programmatic approach<\/em> can be used. Using the programmatic approach, you can indicate which dimensions of the target cube to include in the cell security cube, by using string parameters of a 1 (include) or 0 (exclude). The programmatic approach will result in a cell security cube with a reduced set of dimensions.<\/p>\n<p><strong>Applying Cell Security<\/strong><\/p>\n<p>All cell level security is driven from the values (READ, WRITE or NONE) in the target cubes cell security cube. Obviously, someone with write access to the cell security cube can manually set and maintain these values but that is typically not practical (especially in a controlled environment) and not recommended. Other methods for maintaining the values in a cell security cube are by using CELLPUT functions within a TurboIntegrator process or by assigning rules (to the cell security cube). The preferred approach is to use rules.<\/p>\n<p><strong>Creating Cell Security Rules<\/strong><\/p>\n<p>Once you have a <strong>cell security cube<\/strong> created, you\u2019ll need to create a <em>rules file<\/em> for it. A cube rules file is where rules are saved and is named cube_name.rux. This can again be accomplished manually (right-click the cube and select \u201cCreate Rule\u201d) or programmatically (using the <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=rmtf-ruleloadfromfile\">RuleLoadFromFile<\/a> function). The program approach requires a text file source and, typically, is more applicable for rule maintenance automation, rather than an original rule implementation application.<\/p>\n<p><strong>Manually Applying Cell Security Rules<\/strong><\/p>\n<p>Before implementing any cell security rules, you should have a thorough understanding of what your <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=overview-implementing-tm1-security-scheme\">security scheme<\/a> will need to look like &#8211;\u00a0 including what groups and permissions &#8211; you\u2019ll need. Additionally, the following are some general principals to consider when creating cell security rules:<\/p>\n<ol>\n<li>Make sure to add the key words <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=functions-skipcheck\">SKIPCHECK<\/a> and <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=feeders-skipcheck\">FEEDERS<\/a> (or FEEDSTRINGS) to the rules file.<\/li>\n<li>Use spaces, indenting and annotations within the rules file to improve clarity.<\/li>\n<li>Not all functions work in rules (some are valid in TurboIntegrator only) so make sure you know which <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=reference-rules-functions\">functions are supported within rules<\/a>.<\/li>\n<li>Rules should be organized in \u201c<strong>blocks<\/strong>\u201d and \u201c<strong>stacks<\/strong>\u201d (also referred to as sets). A <em>block<\/em> is a single, complete logical rule statement, and a <em>stack<\/em> is a series of rule blocks, typically applying to particular area in a cube. Liberally use spacing, indenting, and clear annotations to define your blocks and stacks of rules.<\/li>\n<li>The <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=statements-syntax-describing-area\">AREA<\/a> (left side) of a rule identifies one or more cells in a cube and should be as \u201cnarrow\u201d or explicit as possible.<\/li>\n<li>Rules in a rules file are executed from <strong>top-to-bottom<\/strong>. That is, PA will evaluate the rules sequentially and if more than one (rule) statement in a stack of rules applies to the\u00a0<em>same<\/em>area, the first statement takes precedence. The number of levels (rule statements) of stacking that can be accommodated is limited only by available memory, however care should be taken to be as <em>explicit<\/em> as possible in each rule statement and avoid unnecessary levels of rule statements with a rule set.<\/li>\n<li>Typically, cell security rule statements would NOT be used to <u>define<\/u> consolidations, but in an effort of completeness, <em>good practice<\/em> asserts that although you can (define consolidations using rules), it is not recommended since consolidations defined within a dimension process much faster than those defined in rules, especially in very large, sparse cubes.<\/li>\n<li>Thoroughly understanding the logic in a rule stack is important since <strong>circular references<\/strong> can easily occur causing errors and\/or invalid results. A circular reference in Planning Analytics is very similar to a circular reference in MS Excel where a formula refers to its own cell or refers to a cell that&#8217;s dependent on the formula&#8217;s result.\u00a0In some cases, a circular reference may occur when you implement many large rule stacks.<\/li>\n<li>Determining the \u201coptimal\u201d number of rule blocks and rule set levels (for a cube) is typically based upon specific scenarios and may take some experimentation. Generally, \u201c<em>less is more<\/em>\u201d, avoid the \u201c<em>overlap<\/em>\u201d and use <em>variables<\/em> instead of <em>hard-coded string values<\/em> wherever you can.<\/li>\n<li>Verify when the use of STET (cancels or \u201cbypasses\u201d the effect of a rule) or CONTINUE (allows a subsequent rule with the same area definition to be executed ) makes sense. Each will have <em>quite a different effect<\/em> on how overall cell security will be applied.<\/li>\n<li>Consider the use of []:=S as the final rule block in the cell security rules file. Since rule blocks are executed from the top to the bottom, this rule will cover all remaining intersections in the cube that were not \u201ccaught\u201d by the rule blocks above and is particularly useful to cover any new intersections triggered by cube meta data changes.<\/li>\n<\/ol>\n<p>Using the manual approach (for creating cell level security rules), creates a <u>blank<\/u> cube rule file, which you can then open in one of the Planning Analytics <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=rules-use-editor\">rules editor<\/a> options and begin \u201ccomposing\u201d your cell security rules. If you utilize the <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=rules-use-editor\">Planning Analytics Workspace rules editor<\/a>, you will see <strong>line numbers<\/strong> corresponding to line numbers in the TM1 rules .rux file, however the <em>traditional<\/em> Rules Editor does not display line numbers. If you chose to use the traditional editor, you can open the .rux file in a text editor that supports line numbers to view the line numbers for a rule. Line numbers are helpful during rule editing but are particularly important when leveraging the }<a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=cubes-statsbyrule\"><strong>StatsByRule control cube<\/strong><\/a> to optimize or debug your rules (more on this later).<\/p>\n<p><strong>Debugging<\/strong><\/p>\n<p>While testing your security, keep in mind that if you have both cell-level AND element-level security in place, cell-level security <strong><em>overrides<\/em><\/strong> element-level security, so <strong>cell-level security for the cell must be undefined<\/strong>. Cell-level security applies to <u>leaf elements<\/u> and generally does not apply to consolidations, although you can use the NONE and READ security rights to control the display or editing of consolidations. If you do have both security methods in place , allow additional time for testing each scenario.<\/p>\n<p>Planning Analytics provides a tool called the <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=data-debugging-rules\">Rules Tracer<\/a> to assist in the development and debugging of rules and the rule tracer will work with cell security rules. Reviewing specific views within the cube cell security rule is a method of testing the effectiveness of the implemented rule, however in more complicated scenarios, having specific non-admin users (who are assigned to appropriate groups) log into the environment and verify READ, WRITE and NONE intersections is the only way to guarantee correct results.<\/p>\n<p><strong>Rule Statistics<\/strong><\/p>\n<p>Normally, you can monitor rule statistics to gain some insight as to <em>how frequently<\/em> individual rule blocks execute and <em>how long it takes<\/em> to run each rule block. These statistics are stored in the <strong>}StatsByRule<\/strong> control cube. Each time a rule block is changed or compiled, the data for that rule block is cleared and updated in the }StatsByRule control cube. This can help you to instantly see the impact of changes you make in your rules.<\/p>\n<p>The }StatsByRule cube contains three dimensions:<\/p>\n<ul>\n<li><strong>}Cubes<\/strong> &#8211; Contains elements corresponding to each cube on your Planning Analytics server.<\/li>\n<\/ul>\n<ul>\n<li><strong>}LineNumber<\/strong> &#8211; Contains elements 1 through 10,000, corresponding to line numbers in a Planning Analytics rules .rux file (remember, to see the line numbers use the Planning Analytics Workspace rules editor).<\/li>\n<li><strong>}RuleStats<\/strong> &#8211; Contains measure elements that correspond to the information and statistics that are stored for rules on your database.<\/li>\n<\/ul>\n<p>To view the <strong>}StatsByRule <\/strong>cube, you\u2019ll need to set \u201cDisplay Control Objects\u201d (or, in Planning Analytics Workspace, check for it under the Control Objects). If you don\u2019t see any statistics, make sure that you set the <strong>Rule_Stats<\/strong> property for the associated cube to \u201cYES\u201d in the\u00a0<a href=\"https:\/\/www.ibm.com\/docs\/en\/SSD29G_2.0.0\/com.ibm.swg.ba.cognos.tm1_op.2.0.0.doc\/c_cubeproperties_n606d0.html#CubeProperties_N606D0\">}CubeProperties control cube<\/a> and then start Performance Monitor (Performance Monitor is a feature of Planning Analytics that monitors and writes statistics to the }StatsByRule and other cubes). If you still do not see any statistics, wait \u201ca bit\u201d and recheck, since statistics are updated on sixty-minute intervals (also, keep in mind that this data is cleared every time that you restart your Planning Analytics server).<\/p>\n<p>Still not finding any statistics? Well, times recorded are in milliseconds and, some rules do execute <em>faster<\/em> than 1 millisecond, resulting in an entry of 0 or no entry at all showing in the <strong>}<\/strong>StatsByRule cube. In most cases, cell security rules implemented are (should) be relatively simple and therefore the <strong>}<\/strong>StatsByRule cube doesn\u2019t help.<\/p>\n<p><strong>Removing a Cell Security Cube<\/strong><\/p>\n<p>Planning Analytics uses <a href=\"https:\/\/www.ibm.com\/docs\/en\/planning-analytics\/2.0.0?topic=workspace-control-objects\">control objects<\/a> to perform integral system tasks. Most\u00a0<em><strong>control objects<\/strong><\/em>\u00a0are automatically generated by planning analytics and can be considered \u201csystem\u00a0<em>control\u201d objects. Cube cell security cubes are also control objects \u2013 but created by you. Like all <\/em>control objects, a c<em>ube cell security cube<\/em> cannot be deleted by right-clicking and selecting \u201cDelete\u201d; they must be deleted using the <a href=\"https:\/\/www.ibm.com\/docs\/en\/cognos-tm1\/10.2.2?topic=functions-cubedestroy\">CubeDestroy<\/a> function. Using this function will delete the cube and will also (even though the rules exist in a separate file), delete all of the rules you have implemented in that cubes rule file.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>The above information should provide you with a foundation for implementing and maintaining cell level security within a Planning Analytics environment, or simply provide some insight into how security works. In the end, try to keep things as <em>simple as possible<\/em> and be sure your test plan includes logging into Planning Analytics as actual users to validate your assumptions.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cell Level Security Planning Analytics cell level security provides the ability to secure individual cells without the need for a complicated series of element-level security cubes, which sets control on cells in a cube identified by dimension elements. Cell-level security can add a more finite level of control to a cube but can also become&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[77,36,51,98,97],"class_list":["post-4065","post","type-post","status-publish","format-standard","hentry","category-ibm","tag-ibm","tag-planning-analytics","tag-planning-analytics-how-tos","tag-rules","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Do I Use Cell-Level Security in IBM Planning Analytics? - QueBIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Do I Use Cell-Level Security in IBM Planning Analytics? - QueBIT\" \/>\n<meta property=\"og:description\" content=\"Cell Level Security Planning Analytics cell level security provides the ability to secure individual cells without the need for a complicated series of element-level security cubes, which sets control on cells in a cube identified by dimension elements. Cell-level security can add a more finite level of control to a cube but can also become&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"QueBIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-24T12:21:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T16:05:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure.png\" \/>\n\t<meta property=\"og:image:width\" content=\"556\" \/>\n\t<meta property=\"og:image:height\" content=\"337\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patrick Quirke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Quirke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/\"},\"author\":{\"name\":\"Patrick Quirke\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/51bf83d531948247370683787d0f46ff\"},\"headline\":\"How Do I Use Cell-Level Security in IBM Planning Analytics?\",\"datePublished\":\"2023-08-24T12:21:15+00:00\",\"dateModified\":\"2026-01-20T16:05:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/\"},\"wordCount\":1732,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/secure-300x182.png\",\"keywords\":[\"IBM\",\"Planning Analytics\",\"Planning Analytics How To's\",\"Rules\",\"Security\"],\"articleSection\":[\"IBM\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/\",\"name\":\"How Do I Use Cell-Level Security in IBM Planning Analytics? - QueBIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/secure-300x182.png\",\"datePublished\":\"2023-08-24T12:21:15+00:00\",\"dateModified\":\"2026-01-20T16:05:22+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/51bf83d531948247370683787d0f46ff\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/secure.png\",\"contentUrl\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/secure.png\",\"width\":556,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/cell-level-security-in-ibm-planning-analytics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Do I Use Cell-Level Security in IBM Planning Analytics?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#website\",\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\",\"name\":\"QueBIT\",\"description\":\"QueBIT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/#\\\/schema\\\/person\\\/51bf83d531948247370683787d0f46ff\",\"name\":\"Patrick Quirke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g\",\"caption\":\"Patrick Quirke\"},\"sameAs\":[\"https:\\\/\\\/quebit.com\\\/askquebit\\\/\"],\"url\":\"https:\\\/\\\/quebit.com\\\/askquebit\\\/author\\\/pquirke\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Do I Use Cell-Level Security in IBM Planning Analytics? - QueBIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/","og_locale":"en_US","og_type":"article","og_title":"How Do I Use Cell-Level Security in IBM Planning Analytics? - QueBIT","og_description":"Cell Level Security Planning Analytics cell level security provides the ability to secure individual cells without the need for a complicated series of element-level security cubes, which sets control on cells in a cube identified by dimension elements. Cell-level security can add a more finite level of control to a cube but can also become&hellip;","og_url":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/","og_site_name":"QueBIT","article_published_time":"2023-08-24T12:21:15+00:00","article_modified_time":"2026-01-20T16:05:22+00:00","og_image":[{"width":556,"height":337,"url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure.png","type":"image\/png"}],"author":"Patrick Quirke","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patrick Quirke","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/#article","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/"},"author":{"name":"Patrick Quirke","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/51bf83d531948247370683787d0f46ff"},"headline":"How Do I Use Cell-Level Security in IBM Planning Analytics?","datePublished":"2023-08-24T12:21:15+00:00","dateModified":"2026-01-20T16:05:22+00:00","mainEntityOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/"},"wordCount":1732,"commentCount":0,"image":{"@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure-300x182.png","keywords":["IBM","Planning Analytics","Planning Analytics How To's","Rules","Security"],"articleSection":["IBM"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/","url":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/","name":"How Do I Use Cell-Level Security in IBM Planning Analytics? - QueBIT","isPartOf":{"@id":"https:\/\/quebit.com\/askquebit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/#primaryimage"},"image":{"@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure-300x182.png","datePublished":"2023-08-24T12:21:15+00:00","dateModified":"2026-01-20T16:05:22+00:00","author":{"@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/51bf83d531948247370683787d0f46ff"},"breadcrumb":{"@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/#primaryimage","url":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure.png","contentUrl":"https:\/\/quebit.com\/askquebit\/wp-content\/uploads\/2023\/08\/secure.png","width":556,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/quebit.com\/askquebit\/cell-level-security-in-ibm-planning-analytics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quebit.com\/askquebit\/"},{"@type":"ListItem","position":2,"name":"How Do I Use Cell-Level Security in IBM Planning Analytics?"}]},{"@type":"WebSite","@id":"https:\/\/quebit.com\/askquebit\/#website","url":"https:\/\/quebit.com\/askquebit\/","name":"QueBIT","description":"QueBIT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quebit.com\/askquebit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/quebit.com\/askquebit\/#\/schema\/person\/51bf83d531948247370683787d0f46ff","name":"Patrick Quirke","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c2c5ed78cce873ccf3eb420007d81d4fcdacb9bf4936d8b0b463390b69fd05ff?s=96&d=mm&r=g","caption":"Patrick Quirke"},"sameAs":["https:\/\/quebit.com\/askquebit\/"],"url":"https:\/\/quebit.com\/askquebit\/author\/pquirke\/"}]}},"_links":{"self":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/4065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/comments?post=4065"}],"version-history":[{"count":4,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/4065\/revisions"}],"predecessor-version":[{"id":5078,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/posts\/4065\/revisions\/5078"}],"wp:attachment":[{"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/media?parent=4065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/categories?post=4065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quebit.com\/askquebit\/wp-json\/wp\/v2\/tags?post=4065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}