The default security for the Entity, Account, and Movement dimensions
in a new FCCS application is None. In FCCS security terminology,
None does not mean "no access." It means
no restriction — all users see all members. A freshly provisioned
User-role user with no dimension security configuration can see every entity's data,
every account, and every scenario across the entire application.
This is the most common live go-live security failure. Implementations that configure application roles correctly but skip dimension security ship with full data transparency. DeutschWerk's trial balance is visible to AsiaLink's controller. This must be explicitly addressed before go-live.
One of the most reliable exam distractors is "Metadata Administrator" listed as a fourth or fifth application role option. This role does not exist in FCCS. There are exactly four application roles: Service Administrator, Power User, User, and Viewer. Metadata management — importing, editing, refreshing — is performed by the Service Administrator role, not a separate Metadata Administrator role. When you see this option in an exam question, it is always wrong.
| Capability | Svc Admin | Power User | User | Viewer |
|---|---|---|---|---|
| Application Administration | ||||
| Manage metadata (import, edit, refresh) | ✓ | ✗ | ✗ | ✗ |
| Configure dimension security | ✓ | ✗ | ✗ | ✗ |
| Provision users / assign roles | ✓ | ✗ | ✗ | ✗ |
| Configure Approval Unit hierarchies | ✓ | ✗ | ✗ | ✗ |
| Lock / unlock periods | ✓ | With AU | ✗ | ✗ |
| Deploy and manage calculation rules | ✓ | ✗ | ✗ | ✗ |
| Data Operations | ||||
| Load data via Data Management / EPM Automate | ✓ | ✓ | ✗ | ✗ |
| Enter data in data forms | ✓ | ✓ | ✓ | ✗ |
| Run Consolidation | ✓ | ✓ | ✗ | ✗ |
| Run Translation | ✓ | ✓ | ✗ | ✗ |
| Journals | ||||
| Create Standard Journals | ✓ | ✓ | ✓ | ✗ |
| Create Enterprise Journals | ✓ | ✓ | ✓ | ✗ |
| Approve Enterprise Journals | ✓ | ✓ | ✗ | ✗ |
| Post journals | ✓ | ✓ | Own entity | ✗ |
| Reporting | ||||
| View reports and data forms | ✓ | ✓ | ✓ | ✓ |
| Create / edit reports (Report Designer) | ✓ | ✓ | ✗ | ✗ |
| Create Books and Bursting definitions | ✓ | ✓ | ✗ | ✗ |
| Drill-through to source data | ✓ | ✓ | ✓ | ✓ |
| Dimension | Default Access | What "None" Means | GlobalMerge Configuration Required |
|---|---|---|---|
| Entity | None | All entity members visible and accessible to all users | DeutschWerk Controller: Entity = DeutschWerk leaf only. Group Finance Manager + CFO: all entities. |
| Account | None | All account members visible — no account-level restrictions | External Auditor: restrict to P&L and BS aggregates only. Hide detailed sub-accounts if sensitive. |
| Scenario | None | All scenarios visible — Actual, Budget, Forecast all accessible | DeutschWerk Controller: write access to Actual, read-only to Budget. No access to Forecast if not applicable. |
| Movement | None | All movement members accessible | Usually left unrestricted — movement security is rarely required operationally. |
| Year / Period | None | All years and periods accessible | Controlled via Period Lock (Hall 6) rather than dimension security in most implementations. |
A Power User with no Entity dimension security configured sees all entity data across the entire application. The Power User role grants capabilities (run consolidation, enter data) but does not restrict data visibility. Dimension security is the separate, orthogonal layer that scopes what data is visible. Both must be correctly configured — correct role assignment without dimension security leaves all entity data exposed.
The Approval Unit hierarchy defines who must sign off on each entity's data before the period can be locked. It enforces the close workflow — data cannot be consolidated into the parent until all subsidiary Approval Units have been promoted through their required stages. FCCS blocks consolidation if a required Approval Unit is not at the required promotion level.
The Approval Unit hierarchy connects directly to the Bursting behaviour described in Hall 7. When the CFO approves and locks, the Bursting job for entity reports is typically triggered. Because DeutschWerk Controller has been configured with Entity dimension security scoped to DeutschWerk only, the burst output they receive contains only DeutschWerk data — the Bursting engine enforces their dimension security filter. The Group Finance Manager, with full entity access, receives all entity outputs.
Approval Units can be configured at multiple granularities: per entity, per entity-scenario combination, or per entity-scenario-period. For GlobalMerge, the Approval Unit is configured at Entity × Scenario level (DeutschWerk × Actual), allowing the same hierarchy to govern every period close without reconfiguration. Period-specific Approval Units (DeutschWerk × Actual × Q1) are also supported but require more maintenance.
You are the EPM Administrator (Service Administrator) for GlobalMerge Corp. The application has been created and metadata loaded. No security has been configured — all five personas are in the Identity Domain but have no FCCS roles or dimension security. Your task is to provision the complete security configuration before the Q1 FY2026 close cycle begins.
FCCS sandbox · Service Administrator access · Identity Domain users already provisioned: epm.admin@globalmerge.com · finance.manager@globalmerge.com · deutschwerk.controller@globalmerge.com · external.auditor@auditfirm.com · cfo@globalmerge.com · All entities at metadata-ready state.
- 01 Navigate to Navigator → Access Control → Manage Roles. You will see the four FCCS roles listed: Service Administrator, Power User, User, Viewer.
- 02
Assign Service Administrator to
epm.admin@globalmerge.com. This user is already the admin — confirm the role assignment completes without error. - 03
Assign Power User to
finance.manager@globalmerge.comand tocfo@globalmerge.com. - 04
Assign User to
deutschwerk.controller@globalmerge.com. - 05
Assign Viewer to
external.auditor@auditfirm.com. - 06
Validation: Log in as
deutschwerk.controller@globalmerge.com. Confirm the Navigator shows data forms and journals but not application administration options. Without dimension security, you should see all entity data — note this for Exercise 2.
Before configuring dimension security, log in as the DeutschWerk Controller and open
any data form. You will see data for all entities — BritEdge, DeutschWerk,
AsiaLink, NovaTech. This is the default None security state. This is what
goes live if dimension security is not configured. Observe this, then fix it in Exercise 2.
- 01 Navigate to Navigator → Access Control → Dimension Security. Select dimension: Entity.
- 02
Locate user
deutschwerk.controller@globalmerge.com. Set access for GlobalMerge (top parent) = None (no access to the group rollup). Set access for DeutschWerk = Read/Write. - 03
Confirm BritEdge, AsiaLink, NovaTech have no access assigned for this user — they inherit
Nonefrom the parent override you set in Step 02. - 04
For
external.auditor@auditfirm.com: set GlobalMerge = Read (read access to the consolidated total). Set all individual entities = Read. The Viewer role means they cannot enter data regardless — this Read access controls report visibility. - 05
Leave
finance.manager@globalmerge.comandcfo@globalmerge.comat default (None = all access) since they need full entity visibility. - 06 Validation: Log back in as DeutschWerk Controller. Open the same data form. Confirm only DeutschWerk entity appears — BritEdge, AsiaLink, and NovaTech are no longer visible. The go-live gap is closed.
- 01 Scenario Security: Navigate to Dimension Security → Scenario. For DeutschWerk Controller: set Actual = Read/Write, Budget = Read, leave Forecast with no access. This prevents the controller from entering Budget data (a Finance team responsibility).
- 02 For External Auditor: set Actual = Read. No access to Budget or Forecast — auditors should not see forward-looking scenarios.
- 03 Approval Unit Setup: Navigate to Approvals → Approval Unit Hierarchy Definition. Create a new hierarchy named: GlobalMerge_Q1_FY2026_Actual.
- 04
Add DeutschWerk as an Approval Unit in the hierarchy. Configure the promotion path: Stage 1 =
deutschwerk.controller@globalmerge.com(submit), Stage 2 =finance.manager@globalmerge.com(review), Stage 3 =cfo@globalmerge.com(approve and lock). - 05 Repeat for BritEdge, AsiaLink, NovaTech — each with appropriate controllers at Stage 1, the same Group Finance Manager at Stage 2, and the CFO at Stage 3.
- 06
Validation test — External Auditor read-only: Log in as
external.auditor@auditfirm.com. Navigate to a consolidated report. Confirm data is visible (Read access). Attempt to open a data form for input — confirm no input cells are active. Attempt to create a journal — confirm the option is not available. The Viewer role with Read dimension security is correctly enforced. - 07 Bursting security test (linking Hall 7): As the EPM Administrator, run the Q1 entity P&L Bursting job from Hall 7. Confirm DeutschWerk Controller's inbox contains only the DeutschWerk report. Confirm the External Auditor's inbox contains all entity reports (they have Read access to all entities).
All five personas are correctly provisioned. DeutschWerk Controller is scoped to DeutschWerk entity, Actual write / Budget read. External Auditor is read-only across all entities, Actual scenario only. The Approval Unit hierarchy enforces the three-stage close sign-off. Bursting respects dimension security. The application is ready for Q1 FY2026 close.
Security questions in the FCCS exam reliably test: the four application roles
(especially the "Metadata Administrator" distractor), the meaning of the
default None dimension security setting, the independence of role
and dimension security, the Approval Unit workflow, and the interaction between
security and Bursting. Scenario-based questions are standard.
None
means no restriction is applied — not "no access." With no dimension
security configured, a User-role account sees all entity data, all accounts, and all
scenarios. This is the critical go-live gap: correctly assigned application roles
combined with unconfigured dimension security leaves the full application exposed
to all provisioned users.