17
Necto 16 Training Necto Data Security

Necto 16 training 19 - data security

Embed Size (px)

Citation preview

Page 1: Necto 16 training 19 -  data security

Necto 16 Training Necto Data Security

Page 2: Necto 16 training 19 -  data security

Objectives• By the end of this lesson you will be able to perform Necto

Data Security setups• Necto security• Windows security• Mixed security• No Security

Page 3: Necto 16 training 19 -  data security

Agenda•Necto Data Security Administration

• Administrator• Application• Data Security

Page 4: Necto 16 training 19 -  data security

Necto Data Security Administration

Page 5: Necto 16 training 19 -  data security

Necto Data Security Hierarchy

Level 1

Level 2

Level 3

Page 6: Necto 16 training 19 -  data security

Necto Data Security Hierarchy Example

For User - John:Data Security was defined – You may not see the member “2015”.Application- OLAP security for which the user John can see the year “2015”.Administration- The security mode is “No Security”.Question - When John opens a WB with a time dimension, will he be able to see the member “2015”?

Page 7: Necto 16 training 19 -  data security

Necto Data Security Hierarchy Example Answer

John will not be able to see the member “2015” because data security is the highest level in the hierarchy and overrides all others!

Page 8: Necto 16 training 19 -  data security

Necto Data Security Administration level 1

• No Security• Necto• OLAP (Roles)• OLAP (User)

Page 9: Necto 16 training 19 -  data security

Necto Data Security Administration level 2

• Inherit• No Security• Necto• OLAP (Roles)• OLAP (User)

Page 10: Necto 16 training 19 -  data security

Necto Data Security level 3

• Necto Models• OLAP Models

Page 11: Necto 16 training 19 -  data security

Necto Data Security level 3

Within Data Access rights there are 3 levels of security precedence

Level 1 (lowest level) Dimension restriction mode

Level 2 (Mid level) Custom restriction mode

Level 3 (High level) Web service restriction mode

If NECTO Security Mode is chosen then Data Access rights become available

Page 12: Necto 16 training 19 -  data security

Necto Data Security level 3 (Sub Level 1)

Show a view just as a visual cue for creating the security

Select a Dimension, select members and choose the restriction type, then apply.

Page 13: Necto 16 training 19 -  data security

Necto Data Security level 3 (Sub Level 1)

Show MDX can help you create MDX for Slicer security if using component mode

Page 14: Necto 16 training 19 -  data security

Necto Data Security level 3 (Sub level 2)

Show MDX can from the sub level Dimension security can help you create Custom restrictions

Page 15: Necto 16 training 19 -  data security

Necto Data Security level 3 (Sub level 2)

Show MDX can from the sub level Dimension security can help you create Custom restrictions

Page 16: Necto 16 training 19 -  data security

Summary• In this lesson you have learned how to Setup the Data

security types:• OLAP• Necto• Mixed

• Necto Sub level security

Page 17: Necto 16 training 19 -  data security

Thank you, any questions?