Recently, an OAUG member submitted a question about establishing a security model to accommodate multiple user hierarchies across two Essbase platforms. I was honored to be tapped as a subject matter expert who could provide assistance.
I thought others might have similar questions or, better yet, have additional ideas regarding Essbase security. So, I'm sharing the Q&A here. If you find this information helpful, please share with others. And be sure to leave a comment if you have experience working with security hierarchies or have additional questions.