SlideShare a Scribd company logo
1 of 17
Necto Training
Module 26: Necto Data
Security
Objectives
 By the end of this lesson you will be able to perform
Necto Data Security setups
 Necto security
 Windows security
 Mixed security
 No Security
Agenda
 Necto Data Security Administration
 Administrator
 Application
 Data Security
Necto Data Security Administration
Necto Data Security Hierarchy
Level 1
Level 2
Level 3
Necto Data Security Hierarchy Example
 For User - John:
 Data Security was defined – You may not see the
member “2002”.
 Application- OLAP security for which the user John
can see the year 2002.
 Administration- The security mode is “No Security”.
 Question - When Yotam opens a WB with a time
dimension, will he be able to see the member
“2002”?
Necto Data Security Hierarchy Example
Answer
John will not be able to see the member “2002”
because data security is the highest level in the
hierarchy and overrides all others!
Necto Data Security Administration level 1
• No Security
• Necto
• OLAP (Roles)
• OLAP (User)
Necto Data Security Administration level 2
• Inherit
• No Security
• Necto
• OLAP (Roles)
• OLAP (User)
Necto Data Security level 3
• Necto Models
• OLAP Models
Necto Data Security level 3
If Necto Security Mode is
chosen then Data Access
rights become available
Within Data Access rights there are 3
levels of security precedence
Level 1 (lowest level)
Dimension restriction
mode
Level 2 (Mid level)
Custom restriction mode
Level 3 (High level) Web
service restriction mode
Necto Data Security level 3 (Sub Level 1)
Show a view just as a
visual cue for creating
the security
Select a Dimension,
select members and
choose the restriction
type, then apply.
Necto Data Security level 3 (Sub Level 1)
Show MDX can help
you create MDX for
Slicer security if
using component
mode
Necto Data Security level 3 (Sub level 2)
Show MDX can from the
sub level Dimension
security can help you
create Custom
restrictions
Necto Data Security level 3 (Sub level 2)
Show MDX can from the
sub level Dimension
security can help you
create Custom
restrictions
Summary
 In this lesson you have learned how to Setup the
Data security types:
 OLAP
 Necto
 Mixed
 Necto Sub level security
Thank you
Any Questions?

More Related Content

Viewers also liked

Viewers also liked (12)

Cv finance manager
Cv finance managerCv finance manager
Cv finance manager
 
HOW TO MOTIVATE YOURSELF TO WORK OUT…ESPECIALLY WHEN YOU DON’T FEEL LIKE IT
HOW TO MOTIVATE YOURSELF TO WORK OUT…ESPECIALLY WHEN YOU DON’T FEEL LIKE ITHOW TO MOTIVATE YOURSELF TO WORK OUT…ESPECIALLY WHEN YOU DON’T FEEL LIKE IT
HOW TO MOTIVATE YOURSELF TO WORK OUT…ESPECIALLY WHEN YOU DON’T FEEL LIKE IT
 
Img
ImgImg
Img
 
Best nebosh course training in cochin
Best nebosh course training in cochinBest nebosh course training in cochin
Best nebosh course training in cochin
 
Reflexionar y prevenir
Reflexionar y prevenirReflexionar y prevenir
Reflexionar y prevenir
 
Curriculam Final Sunil
Curriculam Final SunilCurriculam Final Sunil
Curriculam Final Sunil
 
Canzone del mare
Canzone del mareCanzone del mare
Canzone del mare
 
Why Pond Aeration is important
Why Pond Aeration is importantWhy Pond Aeration is important
Why Pond Aeration is important
 
Scan002
Scan002Scan002
Scan002
 
T3_e3_caballero_olga
T3_e3_caballero_olgaT3_e3_caballero_olga
T3_e3_caballero_olga
 
M. Goldstein Resume 06-24-16
M. Goldstein Resume 06-24-16M. Goldstein Resume 06-24-16
M. Goldstein Resume 06-24-16
 
Poster for fundraising event
Poster for fundraising eventPoster for fundraising event
Poster for fundraising event
 

Similar to 26 - Panorama Necto 14 data security - visualization & data discovery solution

Session 9 Tp 9
Session 9 Tp 9Session 9 Tp 9
Session 9 Tp 9
githe26200
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
ableelectronics
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
phanleson
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
WilheminaRossi174
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
adinathfashion1
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
eugeniadean34240
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
sagaraccura
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar82
 
Title Networking Essentials Companion GuideAuthor Cisco Networking
Title Networking Essentials Companion GuideAuthor Cisco NetworkingTitle Networking Essentials Companion GuideAuthor Cisco Networking
Title Networking Essentials Companion GuideAuthor Cisco Networking
TakishaPeck109
 

Similar to 26 - Panorama Necto 14 data security - visualization & data discovery solution (20)

#1
#1#1
#1
 
Data abstraction in DBMS
Data abstraction in DBMSData abstraction in DBMS
Data abstraction in DBMS
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Session 9 Tp 9
Session 9 Tp 9Session 9 Tp 9
Session 9 Tp 9
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
Necto 16 training 18 access security
Necto 16 training 18   access securityNecto 16 training 18   access security
Necto 16 training 18 access security
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 
Paper2
Paper2Paper2
Paper2
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
 
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
9.system analysis
9.system analysis9.system analysis
9.system analysis
 
Title Networking Essentials Companion GuideAuthor Cisco Networking
Title Networking Essentials Companion GuideAuthor Cisco NetworkingTitle Networking Essentials Companion GuideAuthor Cisco Networking
Title Networking Essentials Companion GuideAuthor Cisco Networking
 
MDEML_UMLsec4Edge Extending UMLsec to model data-protection-compliant edge co...
MDEML_UMLsec4Edge Extending UMLsec to model data-protection-compliant edge co...MDEML_UMLsec4Edge Extending UMLsec to model data-protection-compliant edge co...
MDEML_UMLsec4Edge Extending UMLsec to model data-protection-compliant edge co...
 

More from Panorama Software

More from Panorama Software (20)

Top BI trends and predictions for 2017
Top BI trends and predictions for 2017Top BI trends and predictions for 2017
Top BI trends and predictions for 2017
 
Centralized BI - IT and the Business
Centralized BI - IT and the BusinessCentralized BI - IT and the Business
Centralized BI - IT and the Business
 
Centralized BI in Healthcare
Centralized BI in HealthcareCentralized BI in Healthcare
Centralized BI in Healthcare
 
Panorama Necto 16
Panorama Necto 16Panorama Necto 16
Panorama Necto 16
 
Panorama Necto the most secure, centralized and state of the art Business i...
Panorama Necto   the most secure, centralized and state of the art Business i...Panorama Necto   the most secure, centralized and state of the art Business i...
Panorama Necto the most secure, centralized and state of the art Business i...
 
Necto 16 training 22 necto server
Necto 16 training 22   necto serverNecto 16 training 22   necto server
Necto 16 training 22 necto server
 
Necto 16 training 15 formulas and exceptions
Necto 16 training 15   formulas and exceptionsNecto 16 training 15   formulas and exceptions
Necto 16 training 15 formulas and exceptions
 
Necto 16 training 5 dimension selector
Necto 16 training 5   dimension selectorNecto 16 training 5   dimension selector
Necto 16 training 5 dimension selector
 
Necto 16 training 9 navigation component
Necto 16 training 9   navigation componentNecto 16 training 9   navigation component
Necto 16 training 9 navigation component
 
Necto 16 training 1 navigation around necto
Necto 16 training 1   navigation around nectoNecto 16 training 1   navigation around necto
Necto 16 training 1 navigation around necto
 
Necto 16 training 24 (archive) nova view to necto migration
Necto 16 training 24 (archive)   nova view to necto migrationNecto 16 training 24 (archive)   nova view to necto migration
Necto 16 training 24 (archive) nova view to necto migration
 
Necto 16 training 20 component mode & java script
Necto 16 training 20   component mode & java scriptNecto 16 training 20   component mode & java script
Necto 16 training 20 component mode & java script
 
Necto 16 training 16 workboard properties and advanced features
Necto 16 training 16   workboard properties and advanced featuresNecto 16 training 16   workboard properties and advanced features
Necto 16 training 16 workboard properties and advanced features
 
Necto 16 training 11 infographics
Necto 16 training 11   infographicsNecto 16 training 11   infographics
Necto 16 training 11 infographics
 
Necto 16 training 7 geo-analytics
Necto 16 training 7   geo-analyticsNecto 16 training 7   geo-analytics
Necto 16 training 7 geo-analytics
 
Necto 16 training 3 ribbon
Necto 16 training 3   ribbonNecto 16 training 3   ribbon
Necto 16 training 3 ribbon
 
Necto 16 training 25 - necto insights
Necto 16 training 25  - necto insightsNecto 16 training 25  - necto insights
Necto 16 training 25 - necto insights
 
Necto 16 training 23 - visual studio modeling
Necto 16 training 23 -  visual studio modelingNecto 16 training 23 -  visual studio modeling
Necto 16 training 23 - visual studio modeling
 
Necto 16 training 21 - single sign on
Necto 16 training 21 -  single sign onNecto 16 training 21 -  single sign on
Necto 16 training 21 - single sign on
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administration
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

26 - Panorama Necto 14 data security - visualization & data discovery solution

  • 1. Necto Training Module 26: Necto Data Security
  • 2. Objectives  By the end of this lesson you will be able to perform Necto Data Security setups  Necto security  Windows security  Mixed security  No Security
  • 3. Agenda  Necto Data Security Administration  Administrator  Application  Data Security
  • 4. Necto Data Security Administration
  • 5. Necto Data Security Hierarchy Level 1 Level 2 Level 3
  • 6. Necto Data Security Hierarchy Example  For User - John:  Data Security was defined – You may not see the member “2002”.  Application- OLAP security for which the user John can see the year 2002.  Administration- The security mode is “No Security”.  Question - When Yotam opens a WB with a time dimension, will he be able to see the member “2002”?
  • 7. Necto Data Security Hierarchy Example Answer John will not be able to see the member “2002” because data security is the highest level in the hierarchy and overrides all others!
  • 8. Necto Data Security Administration level 1 • No Security • Necto • OLAP (Roles) • OLAP (User)
  • 9. Necto Data Security Administration level 2 • Inherit • No Security • Necto • OLAP (Roles) • OLAP (User)
  • 10. Necto Data Security level 3 • Necto Models • OLAP Models
  • 11. Necto Data Security level 3 If Necto Security Mode is chosen then Data Access rights become available Within Data Access rights there are 3 levels of security precedence Level 1 (lowest level) Dimension restriction mode Level 2 (Mid level) Custom restriction mode Level 3 (High level) Web service restriction mode
  • 12. Necto Data Security level 3 (Sub Level 1) Show a view just as a visual cue for creating the security Select a Dimension, select members and choose the restriction type, then apply.
  • 13. Necto Data Security level 3 (Sub Level 1) Show MDX can help you create MDX for Slicer security if using component mode
  • 14. Necto Data Security level 3 (Sub level 2) Show MDX can from the sub level Dimension security can help you create Custom restrictions
  • 15. Necto Data Security level 3 (Sub level 2) Show MDX can from the sub level Dimension security can help you create Custom restrictions
  • 16. Summary  In this lesson you have learned how to Setup the Data security types:  OLAP  Necto  Mixed  Necto Sub level security

Editor's Notes

  1. 1
  2. Necto Data Security has a hierarchy allowing the strongest security type to override the others Level 3 - Data Security is the Highest level of security and also the most granular area, anything set here overrides all else Level 2 - Applications is the 2nd level of security any thing set here over rides the Administration settings for Data Security but is irrelevant if Data Security is set Level 1 - Administration is the lowest (default) level of data security and is overridden by all other types, but is the starting point of your Data security.
  3. Data Security Mode (Administration) – How data is filtered for users at Level 1 No Security –Necto users will not be restricted on the data that they see OLAP (Roles) – Active Directory users will have restrictions placed on their data viewing capabilities based on the roles that they are in on the OLAP cubes or the Users within the cubes OLAP (Users) – Active Directory users will have restrictions placed on their data viewing capabilities based on Dynamic security that is defined by the cube developers and administrators on the cube itself. Necto sends the Effective Username to the cube to identify the user uniquely and data is returned on this basis. This slows down Necto because a unique thread must be used for each user getting data but is very secure data wise. Necto – Windows users and Necto users will have restrictions placed on their data viewing capabilities based on definitions within Necto, You MUST define security restrictions in Level 3 Data Security if you use this option.
  4. Data Security Mode (Applications) – How data is filtered for users at Level 2 For the most par the settings are the same as Level 1 but you can set a different security mode for each Application you setup within Necto Inherit – This is the default setting and means that the Application will take the security from the Application level 1 setting. No Security –Necto users will not be restricted on the data that they see OLAP (Roles) – Active Directory users will have restrictions placed on their data viewing capabilities based on the roles that they are in on the OLAP cubes or the Users within the cubes OLAP (Users) – Active Directory users will have restrictions placed on their data viewing capabilities based on Dynamic security that is defined by the cube developers and administrators on the cube itself. Necto sends the Effective Username to the cube to identify the user uniquely and data is returned on this basis. This slows down Necto because a unique thread must be used for each user getting data but is very secure data wise. Necto – Windows users and Necto users will have restrictions placed on their data viewing capabilities based on definitions within Necto, You MUST define security restrictions in Level 3 Data Security if you use this option.
  5. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Here you setup security roles, to these you can add specific users or User roles. Mode and Scope – for each security role you can set the security mode No Security –Necto users will not be restricted on the data that they see OLAP (Roles) – Active Directory users will have restrictions placed on their data viewing capabilities based on the roles that they are in on the OLAP cubes or the Users within the cubes OLAP (Users) – Active Directory users will have restrictions placed on their data viewing capabilities based on Dynamic security that is defined by the cube developers and administrators on the cube itself. Necto sends the Effective Username to the cube to identify the user uniquely and data is returned on this basis. This slows down Necto because a unique thread must be used for each user getting data but is very secure data wise. Necto – Windows users and Necto users will have restrictions placed on their data viewing capabilities based on definitions within Necto, You MUST define security restrictions in Level 3 Data Security if you use this option. Additionally you can set the scope of the security role Based on an OLAP model / cube or a Necto model Within this you may specify the level of granularity OLAP data source, Database, Model
  6. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Data access rights – Are split in to three sub-categories Web Service (Sub Level 3) – The highest level it will override all others Custom Restriction (Sub Level 2) – Mid level that overrides Dimension restriction Dimension Restriction (Sub Level 1) – Lowest level but the most commonly used
  7. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Dimension Restriction (Sub Level 1) – Lowest level but the most commonly used Choose the Dimension you want to place a restriction upon Choose members of the dimension to restrict Choose the restriction type Allow drill down Allow drill down, show ancestors Hide members No drill down, hide parent members No drill down, show parent members Choose where to apply the restriction Current model Current database Current server
  8. Show MDX is very useful
  9. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Custom Restriction (Sub Level 2) – Advanced topic Use MDX to write Custom restrictions for security, this is a very advanced topic and should only be attempted by Admins or cube designers familiar with MDX and the SDK security model
  10. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Web Service Restriction (Sub Level 3) – Advanced topic This mode is intended for organizations using their own security mechanism and serves to connect to the external security settings. Enter the web service URL for the page Necto should call when the users try to access the defined data scope. Enter the parameters you want to pass to this page.
  11. 17