19.10.2014 Views

MicroStrategy 7 Administrator Guide

MicroStrategy 7 Administrator Guide

MicroStrategy 7 Administrator Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

C<br />

O<br />

N<br />

C<br />

E<br />

P<br />

T<br />

S<br />

The second table would contain the financial fact columns but not the marketingrelated<br />

information as follows:<br />

Customer ID<br />

Transaction<br />

Amount ($)<br />

Current<br />

Balance ($)<br />

Network and operating system security<br />

The network controls access to computers while the operating system controls<br />

access to the files and applications that are stored on a particular computer. It is<br />

important to protect computers, sensitive files and other information from<br />

inadvertent or malicious tampering.<br />

Consult your vendor’s product documentation for information on controlling<br />

security on the network and on individual machines<br />

<strong>MicroStrategy</strong> Intelligence Server authentication<br />

modes<br />

The following is a list of the different types of authentication modes in the<br />

<strong>MicroStrategy</strong> environment:<br />

• standard<br />

• Windows NT<br />

• anonymous<br />

• database<br />

The authentication mode is set for each project source using the Project Source<br />

Manager. For more details about the Project Source Manager, see the following<br />

Getting Started interface topic:<br />

<strong>MicroStrategy</strong> 7 Project Source Manager<br />

Standard authentication<br />

Standard authentication allows users to identify themselves using a system login<br />

ID and password. The system login ID is unique across the entire system.<br />

32 Chapter 4 Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!