SlideShare a Scribd company logo
Necto 16 Training
Necto Data Security
Objectives
• By the end of this lesson you will be able to perform Necto Data
Security setups
• Necto security
• Windows security
• Mixed security
• No Security
Agenda
•Necto Data Security Administration
• Administrator
• Application
• Data Security
Necto Data Security
Administration
Necto Data Security Hierarchy
Level 1
Level 2
Level 3
Necto Data Security Hierarchy
Example
For User - John:
Data Security was defined – You may not see the member “2015”.
Application- OLAP security for which the user John can see the year “2015”.
Administration- The security mode is “No Security”.
Question - When John opens a WB with a time dimension, will he be able to see the
member “2015”?
Necto Data Security Hierarchy
Example Answer
John will not be able to see the member “2015” because data security is the
highest level in the hierarchy and overrides all others!
Necto Data Security Administration level 1
• No Security
• Necto
• OLAP (Roles)
• OLAP (User)
Necto Data Security Administration level 2
• Inherit
• No Security
• Necto
• OLAP (Roles)
• OLAP (User)
Necto Data Security level 3
• Necto Models
• OLAP Models
Necto Data Security level 3
Within Data Access rights there are 3
levels of security precedence
Level 1 (lowest level)
Dimension restriction
mode
Level 2 (Mid level)
Custom restriction mode
Level 3 (High level) Web
service restriction mode
If NECTO Security Mode
is chosen then Data
Access rights become
available
Necto Data Security level 3 (Sub Level 1)
Show a view just as a
visual cue for creating the
security
Select a Dimension,
select members and
choose the restriction
type, then apply.
Necto Data Security level 3 (Sub Level 1)
Show MDX can help
you create MDX for
Slicer security if
using component
mode
Necto Data Security level 3 (Sub level 2)
Show MDX can from the
sub level Dimension
security can help you
create Custom
restrictions
Necto Data Security level 3 (Sub level 2)
Show MDX can from the
sub level Dimension
security can help you
create Custom
restrictions
Summary
• In this lesson you have learned how to Setup the Data security
types:
• OLAP
• Necto
• Mixed
• Necto Sub level security
Thank you, any
questions?

More Related Content

Viewers also liked

The Political Economy of the Trans-Pacific Partnership - UNCTAD
The Political Economy of the Trans-Pacific Partnership - UNCTADThe Political Economy of the Trans-Pacific Partnership - UNCTAD
The Political Economy of the Trans-Pacific Partnership - UNCTADIra Kristina Lumban Tobing
 
Alianza estratégica
Alianza estratégicaAlianza estratégica
Alianza estratégicaPaola Salais
 
PCI-DSS Security Awareness
PCI-DSS Security AwarenessPCI-DSS Security Awareness
PCI-DSS Security AwarenessElsye Sutanawi
 
Spirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinSpirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinAnton Chuvakin
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
小さなお店(実店舗)のためのWeb集客セミナー
小さなお店(実店舗)のためのWeb集客セミナー小さなお店(実店舗)のためのWeb集客セミナー
小さなお店(実店舗)のためのWeb集客セミナーEbisui Kazunori
 
Color Blindness
Color BlindnessColor Blindness
Color BlindnessErik Hong
 
Code igniter + ci phpunit-test
Code igniter + ci phpunit-testCode igniter + ci phpunit-test
Code igniter + ci phpunit-testME iBotch
 
Computer language
Computer languageComputer language
Computer languageHsg_03
 
presentation Alastair Peoples
presentation Alastair Peoplespresentation Alastair Peoples
presentation Alastair PeoplesECR2015
 

Viewers also liked (17)

Jarrera leon
Jarrera leonJarrera leon
Jarrera leon
 
ESP 9
ESP 9ESP 9
ESP 9
 
Necto 16 training 3 ribbon
Necto 16 training 3   ribbonNecto 16 training 3   ribbon
Necto 16 training 3 ribbon
 
The Political Economy of the Trans-Pacific Partnership - UNCTAD
The Political Economy of the Trans-Pacific Partnership - UNCTADThe Political Economy of the Trans-Pacific Partnership - UNCTAD
The Political Economy of the Trans-Pacific Partnership - UNCTAD
 
Alianza estratégica
Alianza estratégicaAlianza estratégica
Alianza estratégica
 
Laravel Unit Testing
Laravel Unit TestingLaravel Unit Testing
Laravel Unit Testing
 
PCI-DSS Security Awareness
PCI-DSS Security AwarenessPCI-DSS Security Awareness
PCI-DSS Security Awareness
 
Spirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinSpirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton Chuvakin
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Lessn plan
Lessn planLessn plan
Lessn plan
 
小さなお店(実店舗)のためのWeb集客セミナー
小さなお店(実店舗)のためのWeb集客セミナー小さなお店(実店舗)のためのWeb集客セミナー
小さなお店(実店舗)のためのWeb集客セミナー
 
Welding 2[EDocFind.com]
Welding 2[EDocFind.com]Welding 2[EDocFind.com]
Welding 2[EDocFind.com]
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
Color Blindness
Color BlindnessColor Blindness
Color Blindness
 
Code igniter + ci phpunit-test
Code igniter + ci phpunit-testCode igniter + ci phpunit-test
Code igniter + ci phpunit-test
 
Computer language
Computer languageComputer language
Computer language
 
presentation Alastair Peoples
presentation Alastair Peoplespresentation Alastair Peoples
presentation Alastair Peoples
 

Similar to Necto 16 training 19 - data security

Data abstraction in DBMS
Data abstraction in DBMSData abstraction in DBMS
Data abstraction in DBMSPapan Sarkar
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfableelectronics
 
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...Denodo
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersPROBOTEK
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfadinathfashion1
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfsagaraccura
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Nagarro
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerTom Keetch
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...Akhil Kumar Pappula
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
SharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the deviceSharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the deviceOlav Tvedt
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesJeff Stokes
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4FRSecure
 
IANS information security forum 2019 summary
IANS information security forum 2019 summaryIANS information security forum 2019 summary
IANS information security forum 2019 summaryKarun Chennuri
 

Similar to Necto 16 training 19 - data security (20)

#1
#1#1
#1
 
Data abstraction in DBMS
Data abstraction in DBMSData abstraction in DBMS
Data abstraction in DBMS
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
 
Your First Guide to "secure Linux"
Your First Guide to "secure Linux"Your First Guide to "secure Linux"
Your First Guide to "secure Linux"
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
SharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the deviceSharePoint Conference - Secure the data, not the device
SharePoint Conference - Secure the data, not the device
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff Stokes
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4
 
IANS information security forum 2019 summary
IANS information security forum 2019 summaryIANS information security forum 2019 summary
IANS information security forum 2019 summary
 

More from Panorama Software

Top BI trends and predictions for 2017
Top BI trends and predictions for 2017Top BI trends and predictions for 2017
Top BI trends and predictions for 2017Panorama Software
 
Centralized BI - IT and the Business
Centralized BI - IT and the BusinessCentralized BI - IT and the Business
Centralized BI - IT and the BusinessPanorama Software
 
Centralized BI in Healthcare
Centralized BI in HealthcareCentralized BI in Healthcare
Centralized BI in HealthcarePanorama Software
 
Panorama Necto the most secure, centralized and state of the art Business i...
Panorama Necto   the most secure, centralized and state of the art Business i...Panorama Necto   the most secure, centralized and state of the art Business i...
Panorama Necto the most secure, centralized and state of the art Business i...Panorama Software
 
Necto 16 training 22 necto server
Necto 16 training 22   necto serverNecto 16 training 22   necto server
Necto 16 training 22 necto serverPanorama Software
 
Necto 16 training 15 formulas and exceptions
Necto 16 training 15   formulas and exceptionsNecto 16 training 15   formulas and exceptions
Necto 16 training 15 formulas and exceptionsPanorama Software
 
Necto 16 training 5 dimension selector
Necto 16 training 5   dimension selectorNecto 16 training 5   dimension selector
Necto 16 training 5 dimension selectorPanorama Software
 
Necto 16 training 9 navigation component
Necto 16 training 9   navigation componentNecto 16 training 9   navigation component
Necto 16 training 9 navigation componentPanorama Software
 
Necto 16 training 1 navigation around necto
Necto 16 training 1   navigation around nectoNecto 16 training 1   navigation around necto
Necto 16 training 1 navigation around nectoPanorama Software
 
Necto 16 training 24 (archive) nova view to necto migration
Necto 16 training 24 (archive)   nova view to necto migrationNecto 16 training 24 (archive)   nova view to necto migration
Necto 16 training 24 (archive) nova view to necto migrationPanorama Software
 
Necto 16 training 20 component mode & java script
Necto 16 training 20   component mode & java scriptNecto 16 training 20   component mode & java script
Necto 16 training 20 component mode & java scriptPanorama Software
 
Necto 16 training 16 workboard properties and advanced features
Necto 16 training 16   workboard properties and advanced featuresNecto 16 training 16   workboard properties and advanced features
Necto 16 training 16 workboard properties and advanced featuresPanorama Software
 
Necto 16 training 11 infographics
Necto 16 training 11   infographicsNecto 16 training 11   infographics
Necto 16 training 11 infographicsPanorama Software
 
Necto 16 training 7 geo-analytics
Necto 16 training 7   geo-analyticsNecto 16 training 7   geo-analytics
Necto 16 training 7 geo-analyticsPanorama Software
 
Necto 16 training 25 - necto insights
Necto 16 training 25  - necto insightsNecto 16 training 25  - necto insights
Necto 16 training 25 - necto insightsPanorama Software
 
Necto 16 training 23 - visual studio modeling
Necto 16 training 23 -  visual studio modelingNecto 16 training 23 -  visual studio modeling
Necto 16 training 23 - visual studio modelingPanorama Software
 
Necto 16 training 21 - single sign on
Necto 16 training 21 -  single sign onNecto 16 training 21 -  single sign on
Necto 16 training 21 - single sign onPanorama Software
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administrationPanorama Software
 
Necto 16 training 14 - one click insight
Necto 16 training 14 -  one click insightNecto 16 training 14 -  one click insight
Necto 16 training 14 - one click insightPanorama Software
 

More from Panorama Software (20)

Top BI trends and predictions for 2017
Top BI trends and predictions for 2017Top BI trends and predictions for 2017
Top BI trends and predictions for 2017
 
Centralized BI - IT and the Business
Centralized BI - IT and the BusinessCentralized BI - IT and the Business
Centralized BI - IT and the Business
 
Centralized BI in Healthcare
Centralized BI in HealthcareCentralized BI in Healthcare
Centralized BI in Healthcare
 
Panorama Necto 16
Panorama Necto 16Panorama Necto 16
Panorama Necto 16
 
Panorama Necto the most secure, centralized and state of the art Business i...
Panorama Necto   the most secure, centralized and state of the art Business i...Panorama Necto   the most secure, centralized and state of the art Business i...
Panorama Necto the most secure, centralized and state of the art Business i...
 
Necto 16 training 22 necto server
Necto 16 training 22   necto serverNecto 16 training 22   necto server
Necto 16 training 22 necto server
 
Necto 16 training 15 formulas and exceptions
Necto 16 training 15   formulas and exceptionsNecto 16 training 15   formulas and exceptions
Necto 16 training 15 formulas and exceptions
 
Necto 16 training 5 dimension selector
Necto 16 training 5   dimension selectorNecto 16 training 5   dimension selector
Necto 16 training 5 dimension selector
 
Necto 16 training 9 navigation component
Necto 16 training 9   navigation componentNecto 16 training 9   navigation component
Necto 16 training 9 navigation component
 
Necto 16 training 1 navigation around necto
Necto 16 training 1   navigation around nectoNecto 16 training 1   navigation around necto
Necto 16 training 1 navigation around necto
 
Necto 16 training 24 (archive) nova view to necto migration
Necto 16 training 24 (archive)   nova view to necto migrationNecto 16 training 24 (archive)   nova view to necto migration
Necto 16 training 24 (archive) nova view to necto migration
 
Necto 16 training 20 component mode & java script
Necto 16 training 20   component mode & java scriptNecto 16 training 20   component mode & java script
Necto 16 training 20 component mode & java script
 
Necto 16 training 16 workboard properties and advanced features
Necto 16 training 16   workboard properties and advanced featuresNecto 16 training 16   workboard properties and advanced features
Necto 16 training 16 workboard properties and advanced features
 
Necto 16 training 11 infographics
Necto 16 training 11   infographicsNecto 16 training 11   infographics
Necto 16 training 11 infographics
 
Necto 16 training 7 geo-analytics
Necto 16 training 7   geo-analyticsNecto 16 training 7   geo-analytics
Necto 16 training 7 geo-analytics
 
Necto 16 training 25 - necto insights
Necto 16 training 25  - necto insightsNecto 16 training 25  - necto insights
Necto 16 training 25 - necto insights
 
Necto 16 training 23 - visual studio modeling
Necto 16 training 23 -  visual studio modelingNecto 16 training 23 -  visual studio modeling
Necto 16 training 23 - visual studio modeling
 
Necto 16 training 21 - single sign on
Necto 16 training 21 -  single sign onNecto 16 training 21 -  single sign on
Necto 16 training 21 - single sign on
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administration
 
Necto 16 training 14 - one click insight
Necto 16 training 14 -  one click insightNecto 16 training 14 -  one click insight
Necto 16 training 14 - one click insight
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 

Necto 16 training 19 - data security

  • 1. Necto 16 Training Necto Data Security
  • 2. Objectives • By the end of this lesson you will be able to perform Necto Data Security setups • Necto security • Windows security • Mixed security • No Security
  • 3. Agenda •Necto Data Security Administration • Administrator • Application • Data Security
  • 5. Necto Data Security Hierarchy Level 1 Level 2 Level 3
  • 6. Necto Data Security Hierarchy Example For User - John: Data Security was defined – You may not see the member “2015”. Application- OLAP security for which the user John can see the year “2015”. Administration- The security mode is “No Security”. Question - When John opens a WB with a time dimension, will he be able to see the member “2015”?
  • 7. Necto Data Security Hierarchy Example Answer John will not be able to see the member “2015” because data security is the highest level in the hierarchy and overrides all others!
  • 8. Necto Data Security Administration level 1 • No Security • Necto • OLAP (Roles) • OLAP (User)
  • 9. Necto Data Security Administration level 2 • Inherit • No Security • Necto • OLAP (Roles) • OLAP (User)
  • 10. Necto Data Security level 3 • Necto Models • OLAP Models
  • 11. Necto Data Security level 3 Within Data Access rights there are 3 levels of security precedence Level 1 (lowest level) Dimension restriction mode Level 2 (Mid level) Custom restriction mode Level 3 (High level) Web service restriction mode If NECTO Security Mode is chosen then Data Access rights become available
  • 12. Necto Data Security level 3 (Sub Level 1) Show a view just as a visual cue for creating the security Select a Dimension, select members and choose the restriction type, then apply.
  • 13. Necto Data Security level 3 (Sub Level 1) Show MDX can help you create MDX for Slicer security if using component mode
  • 14. Necto Data Security level 3 (Sub level 2) Show MDX can from the sub level Dimension security can help you create Custom restrictions
  • 15. Necto Data Security level 3 (Sub level 2) Show MDX can from the sub level Dimension security can help you create Custom restrictions
  • 16. Summary • In this lesson you have learned how to Setup the Data security types: • OLAP • Necto • Mixed • Necto Sub level security

Editor's Notes

  1. Necto Data Security has a hierarchy allowing the strongest security type to override the others Level 3 - Data Security is the Highest level of security and also the most granular area, anything set here overrides all else Level 2 - Applications is the 2nd level of security any thing set here over rides the Administration settings for Data Security but is irrelevant if Data Security is set Level 1 - Administration is the lowest (default) level of data security and is overridden by all other types, but is the starting point of your Data security.
  2. Data Security Mode (Administration) – How data is filtered for users at Level 1 No Security –Necto users will not be restricted on the data that they see OLAP (Roles) – Active Directory users will have restrictions placed on their data viewing capabilities based on the roles that they are in on the OLAP cubes or the Users within the cubes OLAP (Users) – Active Directory users will have restrictions placed on their data viewing capabilities based on Dynamic security that is defined by the cube developers and administrators on the cube itself. Necto sends the Effective Username to the cube to identify the user uniquely and data is returned on this basis. This slows down Necto because a unique thread must be used for each user getting data but is very secure data wise. Necto – Windows users and Necto users will have restrictions placed on their data viewing capabilities based on definitions within Necto, You MUST define security restrictions in Level 3 Data Security if you use this option.
  3. Data Security Mode (Applications) – How data is filtered for users at Level 2 For the most par the settings are the same as Level 1 but you can set a different security mode for each Application you setup within Necto Inherit – This is the default setting and means that the Application will take the security from the Application level 1 setting. No Security –Necto users will not be restricted on the data that they see OLAP (Roles) – Active Directory users will have restrictions placed on their data viewing capabilities based on the roles that they are in on the OLAP cubes or the Users within the cubes OLAP (Users) – Active Directory users will have restrictions placed on their data viewing capabilities based on Dynamic security that is defined by the cube developers and administrators on the cube itself. Necto sends the Effective Username to the cube to identify the user uniquely and data is returned on this basis. This slows down Necto because a unique thread must be used for each user getting data but is very secure data wise. Necto – Windows users and Necto users will have restrictions placed on their data viewing capabilities based on definitions within Necto, You MUST define security restrictions in Level 3 Data Security if you use this option.
  4. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Here you setup security roles, to these you can add specific users or User roles. Mode and Scope – for each security role you can set the security mode No Security –Necto users will not be restricted on the data that they see OLAP (Roles) – Active Directory users will have restrictions placed on their data viewing capabilities based on the roles that they are in on the OLAP cubes or the Users within the cubes OLAP (Users) – Active Directory users will have restrictions placed on their data viewing capabilities based on Dynamic security that is defined by the cube developers and administrators on the cube itself. Necto sends the Effective Username to the cube to identify the user uniquely and data is returned on this basis. This slows down Necto because a unique thread must be used for each user getting data but is very secure data wise. Necto – Windows users and Necto users will have restrictions placed on their data viewing capabilities based on definitions within Necto, You MUST define security restrictions in Level 3 Data Security if you use this option. Additionally you can set the scope of the security role Based on an OLAP model / cube or a Necto model Within this you may specify the level of granularity OLAP data source, Database, Model
  5. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Data access rights – Are split in to three sub-categories Web Service (Sub Level 3) – The highest level it will override all others Custom Restriction (Sub Level 2) – Mid level that overrides Dimension restriction Dimension Restriction (Sub Level 1) – Lowest level but the most commonly used
  6. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Dimension Restriction (Sub Level 1) – Lowest level but the most commonly used Choose the Dimension you want to place a restriction upon Choose members of the dimension to restrict Choose the restriction type Allow drill down Allow drill down, show ancestors Hide members No drill down, hide parent members No drill down, show parent members Choose where to apply the restriction Current model Current database Current server
  7. Show MDX is very useful
  8. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Custom Restriction (Sub Level 2) – Advanced topic Use MDX to write Custom restrictions for security, this is a very advanced topic and should only be attempted by Admins or cube designers familiar with MDX and the SDK security model
  9. Data Security Mode (Data Security) – How data is filtered for users at Level 3 Web Service Restriction (Sub Level 3) – Advanced topic This mode is intended for organizations using their own security mechanism and serves to connect to the external security settings. Enter the web service URL for the page Necto should call when the users try to access the defined data scope. Enter the parameters you want to pass to this page.