Book Image

Implementing Qlik Sense

By : Kaushik Solanki, Ganapati Hegde
Book Image

Implementing Qlik Sense

By: Kaushik Solanki, Ganapati Hegde

Overview of this book

Qlik Sense is a leading platform for business intelligence (BI) solutions. Qlik Sense helps organizations in making informed decisions based on the data they have. This book will teach you how to effectively use Qlik for optimum customer satisfaction. You will undergo a metamorphosis from a developer to a consultant who is capable of building the most suitable BI solutions for your clients. The book will take you through several business cases – this will give you enough insight to understand the needs of the client clearly and build a BI solution that meets or exceeds their expectations. Starting from the pre-project activities, you will go to the actual execution of the project, the implementation, and even maintenance. This book will give you all the information you need - from the strategy to requirement gathering to implementing BI solutions using Qlik Sense. The book will empower you to take the right decisions in tricky and diffi cult situations while developing analytics and dashboards.
Table of Contents (12 chapters)

Authentication and authorization

One important thing most of the consultants forget to talk during the requirement gathering stage is about the authentication and authorization.

Authentication is nothing but knowing if the user is the right and authenticated user. It is like asking the question Who are you? Someone should authenticate if the user is correct user. There are many systems available to do this job, where they save the passcode of the user and then they crosscheck the passcode when authentication is requested, and if the passcode is right then it allows the user to enter the system.

Authorization comes into picture only after the user is authenticated. It is like giving permission to access the data. Not all the users should have access to all the data; giving right permission to the users is necessary to maintain the security of the data.

Let us have a look at thefollowing...