Book Image

MicroStrategy Quick Start Guide

By : Fernando Carlos Rivero Esqueda
Book Image

MicroStrategy Quick Start Guide

By: Fernando Carlos Rivero Esqueda

Overview of this book

MicroStrategy is an enterprise business intelligence application. It turns data into reports for making and executing key organization decisions. This book shows you how to implement Business Intelligence (BI) with MicroStrategy. It takes you from setting up and configuring MicroStrategy to security and administration. The book starts by detailing the different components of the MicroStrategy platform, and the key concepts of Metadata and Project Source. You will then install and configure MicroStrategy and lay down the foundations for building MicroStrategy BI solutions. By learning about objects and different object types, you will develop a strong understanding of the MicroStrategy Schema and Public Objects. With these MicroStrategy objects, you will enhance and scale your BI and Analytics solutions. Finally, you will learn about the administration, security, and monitoring of your BI solution.
Table of Contents (17 chapters)
Title Page
Copyright and Credits
Dedication
Packt Upsell
Foreword
Contributors
Preface
Index

MicroStrategy security levels


There are three levels of security deployed within MicroStrategy. These levels are depicted in the following diagram:

Project-level security

This level applies to an entire Project. The objects used to enforce Project-level security are:

  • Users
  • User Groups
  • Security Roles

These three objects could grant or constrain functionality within a Project.

It is key to understand the difference between a MicroStrategy privilege and a permission. The privilege is always tied to functionality. That is, what a user can or can't do on a given Project and with a given client application. Examples of privileges are report manipulations such as sort, drill, print, and export; use of object editors for developing purposes such as the use of Document or Intelligent Cube editors; and use of certain client applications such as Integrity Manager, Object Manager, and MicroStrategy Mobile, to mention a few. The permissions, on the other hand, are tied to access to objects and folders within...