Security Report Set
All the reports in the OneStream Admin Assist Security Report Set are detailed in this section.
Business Rule Security
The Business Rule Security report shows a list of business rules in the OneStream application with its associated security attributes.
These are the columns on this report:
|
Attribute |
Description |
|---|---|
|
Business Rule Name |
Business rule name |
|
Is Encrypted |
Indicates if the business rule is encrypted or not |
|
Access Group |
Indicates access group of users that can see, but not modify, the business rule |
|
Access Group Descendent |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group |
Shows group of users that can see the business rule and make modifications to it |
Certification Questions Security
The Certification Questions Security report has tabs for group security and profile security for certification questions.
These are the columns on the Certification Questions Group Security report:
|
Attribute |
Description |
|---|---|
|
Certification Question Group Name |
Certification question group name |
|
Description |
Certification question group description |
|
Scenario Type |
Indicates the Scenario Type or Types that the certification question group applies to |
|
Access Group |
Indicates access group of users that can see, but not modify, the certification question group |
|
Access Group Descendent |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group |
Shows group of users that can see the certification question group and make modifications to it |
The second tab is the Certification Questions Profile Security report and shows a list of certification question profiles.
These are the columns on the Certification Questions Profile Security report:
|
Attribute |
Description |
|---|---|
|
Certification Question Profile Name |
Certification question profile name |
|
Description |
Certification question profile description |
|
Cube |
Indicates the cube or cubes that the certification question profile applies to |
|
Scenario Type |
Indicates the Scenario Type or Types that the certification question profile applies to |
|
Access Group |
Indicates access group of users that can see, but not modify, the certification question profile |
|
Access Group Descendent |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group |
Shows group of users that can see the certification question profile and make modifications to it |
Confirmation Rules Security
The Confirmation Rules Security report has tabs for group security and profile security for confirmation rules.
These are the columns on the Confirmation Rules Group Security report:
|
Attribute |
Description |
|---|---|
|
Confirmation Rules Group Name |
Confirmation rules group name |
|
Description |
Confirmation rules group description |
|
Scenario Type |
Indicates the Scenario Type or Types that the confirmation rules group applies to |
|
Access Group |
Indicates access group of users that can see, but not modify, the confirmation rules group |
|
Access Group Descendent |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group |
Shows group of users that can see the confirmation rules group and make modifications to it |
The second tab is the Confirmation Rules Profile Security report and shows a list of confirmation rules profiles.
These are the columns on the Confirmation Rules Profile Security report:
|
Attribute |
Description |
|---|---|
|
Confirmation Rules Profile Name |
Confirmation rules profile name |
|
Description |
Confirmation rules profile description |
|
Cube |
Indicates the cube or cubes that the confirmation rules profile applies to |
|
Scenario Type |
Indicates the Scenario Type or Types that the confirmation rules profile applies to |
|
Access Group |
Indicates access group of users that can see, but not modify, the confirmation rules profile |
|
Access Group Descendent |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group |
Shows group of users that can see the confirmation rules profile and make modifications to it |
Cube Security
The Cube Security report shows a list of cubes in the OneStream application and access and maintenance group names associated with the cubes.
These are the columns on this report:
|
Attribute |
Description |
|---|---|
|
Cube Name |
Cube name |
|
Description |
Cube description |
|
Access Group |
Indicates access group of users that can see, but not modify, the cube |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the cube and make modifications to it |
Cube View Security
The Cube View Security report has tabs for group security and profile security for Cube Views and enables the user to see the security group setup for Cube View Groups and Cube View Profiles.
These are the columns on the Cube View Group Security report:
|
Attribute |
Description |
|---|---|
|
Cube View Group Name |
Cube View Group name |
|
Description |
Cube View Group description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the Cube View Group |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the Cube View and make modifications to it |
The Cube View Profile Security report tab shows a list of Cube View Profiles.
These are the columns on the Cube View Profile Security report:
|
Attribute |
Description |
|---|---|
|
Cube View Profile Name |
Cube View Profile name |
|
Description |
Cube View Profile description |
|
Visibility |
Indicates the visibility settings for the Cube View Profile. This setting controls whether the Cube View Profile is visible in OnePlace, Workflows, Excel, etc. |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the Cube View Group Profile |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the Cube View Group Profile and make modifications to it |
Dashboard Security
The Dashboard Security report has tabs for dashboard maintenance unit security, dashboard group security, and dashboard profile security.
These are the columns on the Dashboard Maintenance Unit Security report:
|
Attribute |
Description |
|---|---|
|
Dashboard Maintenance Unit Name |
Dashboard maintenance unit name |
|
Description |
Dashboard maintenance unit description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the Dashboard Maintenance Unit |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the dashboard maintenance unit and make modifications to it |
The Dashboard Group Security report tab shows a list of dashboard groups.
These are the columns on the Dashboard Group Security report:
|
Attribute |
Description |
|---|---|
|
Dashboard Group Name |
Dashboard group name |
|
Description |
Dashboard group description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the dashboard group |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the dashboard and make modifications to it |
The Dashboard Profile Security report tab shows a list of Dashboard Profiles.
These are the columns on the Dashboard Profile Security report:
|
Attribute |
Description |
|---|---|
|
Dashboard Profile Name |
Dashboard profile name |
|
Description |
Dashboard profile description |
|
Visibility |
Indicates the visibility settings for the dashboard profile. This setting controls whether the dashboard profile is visible in OnePlace, Workflows, Excel, etc. |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the dashboard profile |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the dashboard profile and make modifications to it |
Data Management Security
The Data Management Security report has tabs for group security and profile security for data management jobs and enables the user to see the security group setup for data management groups and data management profiles.
These are the columns on the Data Management Group Security report:
|
Attribute |
Description |
|---|---|
|
Data Management Group Name |
Data management group name |
|
Description |
Data management group description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the data management group |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the data management job and make modifications to it |
The Data Management Profile Security report tab shows a list of data management profiles.
These are the columns on the Data Management Profile Security report:
|
Attribute |
Description |
|---|---|
|
Data Management Profile Name |
Data management profile name |
|
Description |
Data management profile description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the data management profile |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the data management profile and make modifications to it |
Data Source Security
The Data Source security report shows a list of all data sources in the OneStream application. Because data sources can vary by Scenario Type, the Scenario Type attribute is also included in the report. The following example shows the report and a table of the attributes.
|
Attribute |
Description |
|---|---|
|
Scenario Type |
This allows the profile to be assigned to a specific Scenario Type or All Scenario Types. If the data source is assigned to a specific Scenario Type, it will only be available when assigned to the Workflow Profile. |
|
Data Source Name |
Name of the data source |
|
Description |
Description of the data source (if available) |
|
Layout Type |
The layout type of the data source. It will be Fixed, Delimited, Connector, or DataMgmtExportSequence. |
|
Cube |
The cube associated with this data source, which will dictate the available dimensions that can be used |
|
Access Group Name |
Members of the assigned group have the authority to access the data source. |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Members of the assigned group have the authority to maintain the data source. |
Dimension Metadata Security
The Dimension Metadata Security report enables a user to run a report that shows access to dimension members down to the user level. This report is useful to an administrator looking to see what entities a user has access to, for example, and can be used to trace security setup issues. It is also useful as an audit report to show who has access to what metadata in the application.
Select a dimension in the drop-down menu and optionally the top member in the dimension that you would like to run the report for. Then, click the Run button to generate a report as shown in the following example. For large dimensions, this may take several minutes.
The following example shows the output:
These are the columns on this report:
|
Attribute |
Description |
|---|---|
|
Dimension Name |
The name of the dimension selected when running the report |
|
Member Name |
Member name |
|
Security Type |
This includes all applicable security groups for the selected dimension. |
|
Assigned Group |
The security group applied for the specified group type. The group that is explicitly assigned in the metadata will show as Direct under assignment type. |
|
Descendent |
For groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Inheritance Path |
This column shows how the group or user received access through an inheritance path. The first group listed is the group that the descendent has access to. Reading the inheritance path to the right will show how groups are nested to ultimately arrive to the ancestor. In the previous example, the Everyone group contains (All users). |
|
Alternate Inheritance Path |
This column shows how the group or user received the access through an inheritance path but in reversed order to show from child to parent. The first item will be the descendent. Reading the inheritance path to the right will show how groups are nested to ultimately arrive at the ancestor. In the previous example, (All users) are a member of the Everyone group. |
|
Child Enabled |
Whether or not the child is enabled for provisioning |
The report has the potential to generate thousands of records because it drills down to user-level access for all members of a dimension. Therefore, large dimensions with complex security group structures will be slower to generate. To help with performance, the Everyone and Nobody groups will not drill down to user-level access. If details on the Everyone group are required, navigate to the User Analysis report. The list of users can be exported to Excel as a supplement to the Dimension Metadata Security report. For dimensions with many members, it is recommended to pre-filter the report by selecting a parent member.
Dimension Security
The Dimension Security report shows the access group and maintenance group security associated with all dimensions in the OneStream application. The following example shows this report.
These are the columns on this report:
|
Attribute |
Description |
|---|---|
|
Dimension Type |
This is the type of the dimension, such as Entity, Account, UD1, etc. Only the customizable dimensions will be shown on this report. The Parent, Cons, Origin, IC, View, and Time dimensions are not securable and therefore will not display here. |
|
Dimension Name |
Dimension name |
|
Description |
Dimension description (if available) |
|
Access Group Name |
Security group that has access to the dimension but cannot modify it |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Security group that has access and can make changes to the dimension |
Form Template Security
The Form Template Security report has tabs for group security and profile security for form templates and enables the user to see the security group setup for form template groups and form template profiles.
These are the columns on the Form Template Group Security report:
|
Attribute |
Description |
|---|---|
|
Form Template Group Name |
Form template group name |
|
Description |
Form template group description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the form template group |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the form template group and make modifications to it |
The Form Template Profile Security report tab shows a list of form template profiles.
These are the columns on the Form Template Profile Security report:
|
Attribute |
Description |
|---|---|
|
Form Template Profile Name |
Form template profile name |
|
Description |
Form template profile description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the form template profile |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the form template profile and make modifications to it |
Journal Template Security
The Journal Template Security report has tabs for group security and profile security for journal templates and enables the user to see the security group setup for journal template groups and journal template profiles.
These are the columns on the Journal Template Group Security report:
|
Attribute |
Description |
|---|---|
|
Journal Template Group Name |
Journal template group name |
|
Description |
Journal template group description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the journal template group |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the journal template group and make modifications to it |
The Journal Template Profile Security report tab shows a list of journal template profiles.
These are the columns on the Journal Template Profile Security report:
|
Attribute |
Description |
|---|---|
|
Journal Template Profile Name |
Journal template profile name |
|
Description |
Journal template profile description |
|
Access Group Name |
Indicates access group of users that can see, but not modify, the journal template profile |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Shows group of users that can see the journal template profile and make modifications to it |
Other Security Reports
The Other Security Reports group contains additional reports for analytics and review purposes. The Groups with User Count tab lists all security groups in the system with the number of members in the group (either users or other groups). This can be helpful for removing unnecessary groups that do not contain members. The following example shows the output.
The Users with Group Count tab shows a list of users in the system, a flag that indicates if the user is enabled, and the number of total groups the user belongs to. Like the Groups with User Count report, this report can identify users that need to be disabled when they do not belong to any groups.
The Groups with Assigned Children tab shows the groups and related users within each group.
Security Group Analysis
The Security Group Analysis report shows a list of current groups in the system. More details on a group can be accessed by clicking on the name in the list in the left panel. This will update the reports in the right panel, as shown in the following example:
The top panel shows which users or groups have been provisioned in the selected group. In the previous example, JEM_LocalUser, JEM_Approver, and JEM_Commentator have been directly assigned to JEM_Solution_User_Group. This report has columns Group or User Name, Description, Is Enabled (True or False), and Type (User or Group).
The bottom panel shows which groups or users inherit access to the group based on their direct provisioning. In addition to the Descendent, Description, Is Enabled, and Type columns, this report has additional columns:
|
Attribute |
Description |
|---|---|
|
Assignment Type |
Direct indicates that the group or user has been directly provisioned in the group. Inherited indicates that the group or user receives access to this group indirectly through nested security groups. |
|
Inheritance Path |
This column shows how the group or user received access through an inheritance path. The first group listed is the group that the descendent has access to. Reading the inheritance path to the right will show how groups are nested to ultimately arrive at the ancestor. In the previous example, the first record shows that JEM_Solution_User_Group contains JEM_Approver. |
Security Hierarchy
The Security Hierarchy report enables users to see the full security assignment structure for the application. The report has List View and Hierarchy View. To run, select the layout of the report to view, then click the Run button.
List View
The List View shows a flat list of parent-child relationships in the security structure. This view is useful for exporting the data to Excel and using a pivot table to analyze the data.
NOTE: Only groups with provisioned users or groups will display in this report. The following example is a sample of the report.
|
Attribute |
Description |
|---|---|
|
Ancestor |
Security group that has groups or users provisioned |
|
Descendent |
Security group or user that has access to the parent group |
|
Descendent Type |
Indicates whether the child is a group or user |
|
Assignment Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Inheritance Path |
This column shows how the group or user received access through an inheritance path. The first group listed is the group that the descendent has access to. Reading the inheritance path to the right will show how groups are nested to ultimately arrive to the ancestor. In the previous example, the first record shows that Administrators contains ACM_Admin. Focusing on the ACM_Admin user, there are several parents that contain the Administrators group. Therefore, the security settings for those parents will be inherited by the Administrators group and ultimately by the ACM_Admin user. |
|
Alternate Inheritance Path |
This column shows how the group or user received the access through an inheritance path but in reversed order to show from child to parent. The first item will be the descendent. Reading the inheritance path to the right will show how groups are nested to ultimately arrive to the ancestor. In the previous example, the first record shows that ACM_Admin is a member of Administrators. |
Hierarchy View
The Hierarchy view shows how security groups are nested and whether inherited security is in effect. The following example is a sample of this report. It shows which groups or users belong to each group and will inherit that security profile.
This report has these columns:
|
Attribute |
Description |
|---|---|
|
Group or User Name |
Name of the group or user |
|
Object Type |
Indicates if the object is a group or a user |
|
Is Enabled |
Whether or not the object is enabled for provisioning |
Transformation Rule Security
The Transformation Rule Security report shows tabs for transformation rule group security and transformation rule profile security.
These are the columns on the Transformation Rule Group Security report:
|
Attribute |
Description |
|---|---|
|
Cube Dimension Name |
Dimension to which the rule group is assigned |
|
Dimension Name |
Dimension type (for example, Entity, Account) |
|
Rule Group name |
Name of the rule group |
|
Rule Group Description |
Description of the rule group (if applicable) |
|
Access Group Name |
Members of this group will have access to the transformation rule group |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Members of this group have the authority to maintain the transformation rule group. |
The Transformation Rule Profile Security report tab shows a list of transformation rule profiles.
These are the columns on the Transformation Rule Profile Security report:
|
Attribute |
Description |
|---|---|
|
Rule Profile Name |
Name of the rule profile |
|
Rule Profile Description |
Description of the rule profile (if applicable) |
|
Cube Name |
Cube to which the rule profile is assigned |
|
Scenario Type |
Scenario Type to which the rule profile is assigned |
|
Access Group Name |
Members of this group will have access to the transformation rule profile |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Members of this group have the authority to maintain the transformation rule profile. |
User Analysis
The User Analysis report shows a list of current users in the system and includes the following attributes:
|
Attribute |
Description |
|---|---|
|
Is Enabled |
If selected, the user is enabled and can be provisioned in security groups. If clear, the user is not enabled and cannot be provisioned. |
|
User Type |
Interactive: Allows all functionality. The user type defaults to Interactive for new users and upgrades. View: Allows users to view all data, reports, and dashboards in the production environment and the derived database. The View user privileges do not permit the authorized user to load, calculate, consolidate, certify, or change data. Restricted: Assigns contractual limits for certain functional tasks, such as limiting rights to solutions, for example, Account Reconciliation or Lease. Third Party Access: Allows OneStream access using a named account, logging on interactively using a third-party application. There is no access using the OneStream Windows application or the OneStream Modern Browser Experience. The user cannot change data or modify OneStream application artifacts. Financial Close: Allows users to perform Account Reconciliation solutions and Transaction Matching. |
More details on a user can be accessed by selecting the user name in the list in the left panel. This will update the reports in the right panel, as shown in the following example:
Select a user name to see additional provisioning details.
The top panel shows which groups the user has been directly provisioned in. In the previous example, ACM_Admin has been directly assigned to Administrators. This report has columns Group Name and Group Description.
The bottom panel shows which groups the user inherits based on their direct provisioning. In addition to the Parent and Description columns, this report has additional columns:
|
Attribute |
Description |
|---|---|
|
Assignment Type |
Direct indicates that the user has been directly provisioned in the group. Inherited indicates that the user receives access to this group indirectly through nested security groups. |
|
Inheritance Path |
This column shows how the user received access through an inheritance path. The first group on the left shows the group that the user is directly assigned to (for direct assignments, this will be the only group). Reading the inheritance path to the right will show how groups are nested to ultimately arrive at the top group. In the previous example, ACM_Admin is directly assigned to Administrators, and it inherits access to ParentGroupTest, Test Parent, and TestParent. |
User Inactive List
The User Inactive List shows a list of all users with no login history in the OneStream environment.
User Last Logon
The User Last Logon report shows a list of all users in the OneStream environment and the last time they logged in to the system.
The following additional attributes are available on the report:
|
Attribute |
Description |
|---|---|
|
Application Name |
Last application the user logged on to |
|
Last Activity |
Time stamp of last activity |
|
Days Idle |
Calculation of days idle |
|
Name |
Name on the audit log (will be blank if the user has been deleted) |
|
Description |
User description |
|
User Type |
User type (will be Unknown if user has been deleted) |
|
Is Enabled |
If the user is enabled within the system or has been deactivated |
|
External Authentication Provider Name |
Name of the external authentication provider (for example, Azure AD) |
|
External User Name |
User name from the external authentication provider |
|
|
Email from Preferences section of profile |
|
Culture |
Culture from Preferences section of profile |
|
Number of Grid Rows |
Grid Rows Per Page under Preferences section of profile |
|
Number of Invalid Logon Attempts |
Number of invalid logon attempts by the user |
|
Text 1 – 4 |
Text fields associated with the user profile |
User List
The User List report is a comprehensive list of all users in the system and the attributes associated with their user profile.
For each user, the following attributes are available in the report.
|
Attribute |
Description |
|---|---|
|
Description |
User description |
|
User Type |
User type (will be Unknown if user has been deleted) |
|
Is Enabled |
If the user is enabled within the system or has been deactivated |
|
External Authentication Provider Name |
Name of the external authentication provider (for example, Azure AD) |
|
External User Name |
User name from the external authentication provider |
|
Password Creation Time |
Password creation time (will be empty if external authentication) |
|
|
Email from Preferences section of profile |
|
Culture |
Culture from Preferences section of profile |
|
Number of Grid Rows |
Grid Rows Per Page under Preferences section of profile |
|
Number of Invalid Logon Attempts |
Number of invalid logon attempts by the user |
|
Text 1 – 4 |
Text fields associated with the user profile |
|
User’s Groups |
Groups that the user is directly assigned to |
User List by Group
The User List by Group report is identical to the User List report with the addition of Group Name and Group Description fields.
User Logon By App
The User Logon By App report is a detailed list of all applications and the last logon by user. Unlike the User Last Logon report, which lists the last time a user logged on, this report will show the last time a user logged on by application. This may be helpful if multiple applications are used in the environment.
The following additional attributes are available on the report:
|
Attribute |
Description |
|---|---|
|
Application Name |
Name of the application the user logged on to |
|
Last Activity |
Time stamp of last activity by app |
|
Name |
Name on the audit log (will be blank if the user has been deleted) |
|
Description |
User description |
|
User Type |
User type (will be Unknown if user has been deleted) |
|
Is Enabled |
If the user is enabled within the system or has been deactivated |
|
External Authentication Provider Name |
Name of the external authentication provider (for example, Azure AD) |
|
External User Name |
User name from the external authentication provider |
|
|
Email from Preferences section of profile |
|
Culture |
Culture from Preferences section of profile |
|
Number of Grid Rows |
Grid Rows Per Page under Preferences section of profile |
|
Number of Invalid Logon Attempts |
Number of invalid logon attempts by the user |
|
Text 1 – 4 |
Text fields associated with the user profile |
Workflow Security
The Workflow Security report shows all security group assignments associated with all workflows and Scenario Types in the OneStream application. Users can also filter the workflows to a specific Cube Root Profile and further filter it to a specific workflow and its dependents. The following example shows this report with a table of the attributes.
NOTE: When the Active flag is false and all groups use the default group settings, the Workflow Profile-Scenario Type combination will not display on the report. However, if a Workflow Profile has any security group assigned, even if it is not active, it will show up on the report.
|
Attribute |
Description |
|---|---|
|
Profile Name |
Workflow Profile name |
|
Scenario Type |
Scenario Type |
|
Active |
Indicates if the profile is active or not |
|
Profile Type |
Workflow Profile type |
|
Cube Name |
Name of the cube associated with the workflow |
|
Access Group Name |
Controls the user or users that will have access to the Workflow Profile at runtime to view results |
|
Maintenance Group Name |
Controls the user or users that will have access to maintain and administer the Workflow Profile group |
|
Workflow Execution Group Name |
This group is configured for data loaders and allows users to run the workflow. |
|
Certification Signoff Group Name |
This group is configured for certifiers and allows users to sign off on the workflow. This group can be used to separate duties between a data loader and certifier. |
|
Journal Process Group Name |
Access to this group allows users to process a journal. |
|
Journal Approval Group Name |
Access to this group allows users to approve a journal. |
|
Journal Post Group Name |
Access to this group allows users to post a journal. |
Workflow Security (Expanded)
The expanded Workflow Security (Expanded) report shows all security group assignments associated with all workflows and Scenario Types in the OneStream application. Users can also filter the workflows to a specific Cube Root Profile and further filter it to a specific workflow and its dependents. The following example shows this report with a table of the attributes.
NOTE: When the Active flag is false and all groups use the default group settings, the Workflow Profile-Scenario Type combination will not display on the report. However, if a Workflow Profile has any security group assigned, even if it is not active, it will show up on the report.
|
Attribute |
Description |
|---|---|
|
Profile Name |
Workflow Profile name |
|
Scenario Type |
Scenario Type |
|
Active |
Indicates whether the profile is active or not |
|
Profile Type |
Workflow Profile type |
|
Cube Name |
Name of the cube associated with the workflow |
|
Access Group Name |
Controls the user or users that will have access to the Workflow Profile at runtime to view results |
|
Access Group Descendent Name |
For access groups that contain other groups or users, the child group will display here. (Only shown for groups and users detail level) |
|
Access Group Descendent Type |
Indicates whether the child is a group or user (only shown for groups and users detail level) |
|
Access Group Inheritance Type |
Indicates whether the child is directly assigned or inherits access to the parent |
|
Maintenance Group Name |
Controls the user or users that will have access to maintain and administer the Workflow Profile group |
|
Workflow Execution Group Name |
This group is configured for data loaders and allows users to run the workflow. |
|
Certification Signoff Group Name |
This group is configured for certifiers and allows users to sign off on the workflow. This group can be used to separate duties between a data loader and certifier. |
|
Journal Process Group Name |
Access to this group allows users to process a journal. |
|
Journal Approval Group Name |
Access to this group allows users to approve a journal. |
|
Journal Post Group Name |
Access to this group allows users to post a journal. |


