Book Image

Microsoft Tabular Modeling Cookbook

By : Paul te Braak
Book Image

Microsoft Tabular Modeling Cookbook

By: Paul te Braak

Overview of this book

Business Intelligence Semantic Models (BISM) is a technology that is designed to deliver analytical information to users through a variety of mechanisms that include model structure, definition, and design. This book demonstrates how to create BISM models so that information can be presented to users in an intuitive and easy-to-use format. Once the model is defined, we also show you how it can be managed and maintained so that the data in it remains current and secure. Microsoft Tabular Modeling Cookbook is an all-encompassing guide to developing, managing, creating, and using analytical models using the Business Intelligence Semantic Model (BISM). This title covers a range of modeling situations and common data analysis related problems to show you the techniques required to turn data into information using tabular modeling. Microsoft Tabular Modeling Cookbook examines three areas of tabular modeling: model development, model management and maintenance, and reporting. This book is a practical guide on how to develop semantic models and turn business data into information. It covers all phases of the model lifecycle from creation to administration and finally reporting. It also shows you how to create models which are designed to analyze data. All sections of BISM modeling from development to management and finally reporting are covered. The sections on development examine a wide range of techniques and tricks required to build models, including moving data into the model, structuring the model to manipulate the data, and finally the formulas required to answer common business questions; all of these are discussed in this book in detail. Finally, the book examines methods of reporting on the data within the model, including the creation of data-driven workbooks and reports for a powerful end user experience.
Table of Contents (18 chapters)
Microsoft Tabular Modeling Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Securing data with roles


Often, there is a desire to restrict the amount of data that a user can see. This can take two forms. Firstly, there may be a need to restrict data because of a security concern, that is, the user should only be able to read information from the model that relates to their area of operating concern. Typical examples of this type of security restrictions are based on geographical areas, reporting, or departmental lines. Restricting data through security is examined in this recipe and the Implementing dynamic security recipe in this chapter. Secondly, we may wish to restrict the objects that a user can see when they connect to the server. This is not the application of a security feature, but simply the creation of specific view(s) for the user. This is achieved through the use of perspectives (which is examined in the Creating perspectives recipe in this chapter).

Tabular modeling on an SSAS server implements role-based security. This is similar to the way SSAS implements...