{"id":144,"date":"2009-06-29T19:31:00","date_gmt":"2009-06-29T19:31:00","guid":{"rendered":"http:\/\/turtlellc.com\/index.php\/bpc-security-in-a-nutshell\/"},"modified":"2009-06-29T19:31:00","modified_gmt":"2009-06-29T19:31:00","slug":"bpc-security-in-a-nutshell","status":"publish","type":"post","link":"https:\/\/www.turtle.works\/knowledge\/bpc-security-in-a-nutshell\/","title":{"rendered":"BPC Security in a Nutshell"},"content":{"rendered":"<p><span style=\"font-weight: bold;\">Security is broken down to 4 aspects:<\/span><\/p>\n<ol>\n<li>Users\n<ol>\n<li>Basic component of security. User, Email, IM, etc.<\/li>\n<p><\/ol>\n<\/li>\n<li>Teams\n<ol>\n<li>Basic grouping of users<\/li>\n<li>You can assign Task and Member Access Profiles to Teams<\/li>\n<\/ol>\n<\/li>\n<p><\/p>\n<li>Task Profiles\n<ol>\n<li>Application related security<\/li>\n<li>User\/Team Activities and roles specified here<\/li>\n<li>There is a finite number of Tasks configured in BPC. See Task Profile Descriptions in the BPC Administration Help<\/li>\n<\/ol>\n<\/li>\n<p><\/p>\n<li>Member Access Profiles\n<ol>\n<li>Dimension and member related security<\/li>\n<li>Example, you can specify which periods are ready to receive forecasts<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: bold;\">Security Assignment<\/span>:<br \/>Users&#8211;><br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Task Profiles<br \/>Teams&#8211;><\/p>\n<p>Users&#8211;><br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Member Access Profiles<br \/>Teams&#8211;><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is broken down to 4 aspects: Users Basic component of security. User, Email, IM, etc. Teams Basic grouping of users You can assign Task and Member Access Profiles to Teams Task Profiles Application related security User\/Team Activities and roles specified here There is a finite number of Tasks configured in BPC. See Task Profile &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.turtle.works\/knowledge\/bpc-security-in-a-nutshell\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;BPC Security in a Nutshell&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,16],"tags":[],"class_list":["post-144","post","type-post","status-publish","format-standard","hentry","category-bpc","category-outlooksoft"],"_links":{"self":[{"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":0,"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/posts\/144\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/categories?post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.turtle.works\/knowledge\/wp-json\/wp\/v2\/tags?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}