Chapter 10. Design and Implementation of the Security Model
Usually, big companies choose enterprise BI solutions in order to meet all their requirements. One of the main requirements is providing security for thousands of users, because, usually, organizations have lots of various sensitive data, such as finance, marketing, inventory, and so on. For example, salary information is private information, and we should be sure that only HR people have access to this data. Another example is security rules based on geography. If a company has many branches, we should add security rules in order that every branch can see only their own information. Moreover, BI tools offer us rich functionality for creating, publishing, and sharing reports. We should be careful with types of access, because inexperienced users can change the dashboard, or even break it.
Despite the fact that there are plenty of BI tools on the market, they all use the same idea for building security models. In this chapter, we...