Security Configuration and Planning

Use Security Configuration to control user access to certain information in Planning.

You control access to the following data via each user's assigned security role:

  • Labor cost rates and amounts

  • Changes to general information, such as WBS levels, the baseline, and the percent complete formula

  • Changes to rate information, such as the budget type, rate and method tables, and rate overrides

  • Changes to analysis information, such as compensation, consultant fees, and reimbursable allowance