19.10.2014 Views

MicroStrategy 7 Administrator Guide

MicroStrategy 7 Administrator Guide

MicroStrategy 7 Administrator Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

C<br />

O<br />

N<br />

C<br />

E<br />

P<br />

T<br />

S<br />

◊<br />

◊<br />

Top level: Store<br />

Bottom level: not specified<br />

1RWHÃ<br />

Within a project, a security filter may be specified for any user.<br />

Whenever a user submits an element browse request or a report execution request,<br />

the security filter is applied.<br />

Connection mapping<br />

By default, all users use the same database connection and the same database login<br />

when submitting queries to the warehouse database. Connection mapping allows<br />

you to map particular users to different database connections and different<br />

database logins.<br />

1RWHÃConnection mapping only applies to the warehouse database.<br />

To learn about...<br />

...the editors and managers used to configure and manage security, see the<br />

following Interfaces topics:<br />

• Group Editor<br />

• Project Configuration Editor<br />

• Security Role Editor<br />

• User Connection Monitor<br />

• User Editor<br />

• User Manager<br />

• User Manager Integrity Checker<br />

...security tasks you can perform using <strong>MicroStrategy</strong> Desktop, see the following<br />

How do I...? topics:<br />

• Access Control Lists<br />

38 Chapter 4 Security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!