Book Image

Instant SQL Server Analysis Services 2012 Cube Security

By : Satya Shyam K Jayanty
Book Image

Instant SQL Server Analysis Services 2012 Cube Security

By: Satya Shyam K Jayanty

Overview of this book

SQL Server 2012 includes BI-specific features such as cube analytics, reporting-related features, multidimensional BI semantic models, and many more. This is a new addition that is of great use to Business Analysts, who can now build BI semantic models using the relational tables from the database engine rather than the dimensions from analysis services. Instant Microsoft SQL Server Analysis Services 2012 Cube Security is a practical, hands-on guide that provides clear, step-by-step recipes for getting started with cube security. As a Database Administrator and Data Architect, data security is of prime concern, and this book highlights the key concepts of securing cubes. By the end of this book, you will understand the SQL Server security model and how to effectively implement the same on the data platform. Security is paramount within a data platform, and thankfully, the issues surrounding data access can be fixed in the initial stages of its design. This allows you to avoid any breach of data access layers. The recipes in this book consist of the required ingredients to implement and administer OLAP & BI security management for your cubes. With this book, you will master the key aspects of implementing and managing security essentials and securing data layers. The recipes in this book incorporate best practice implementation, which include step-by-step instructions for creating models that implement security based on the currently logged on Windows user name or based on custom data passed to analysis services. The new BI platform features will help end users, business users, and technology users by providing a robust environment for IT, planning, budgeting, forecasting with scorecards, and reporting capabilities for the business users. These analytics will help end users to create a comprehensive management application to view the data with ease.
Table of Contents (7 chapters)

Securing key points in SSAS (Advanced)


Security and auditing are the primary concerns for a DBA, to secure business data that is stored in a cube, and the provision of end-to-end treatment of security configuration is beyond the scope of this book. However, the key points are referred to in this recipe to secure the cube data.

How to do it...

Perform the following steps:

  1. Ensure that the SSAS instance is installed behind the firewall and the default port that the AS instance communicates with is 2383.

  2. To change the default port, scroll down to the Port row under the Analysis Server? Properties page and modify the Current Value column to a desired numbered value.

  3. The SSAS instance can be set up to use HTTP to communicate with clients. In such cases, ensure that you open port 80 or port 443.

    Note

    As a best practice ensure you open the assigned port number in the firewall for TCP/IP traffic. If the value is 0, the AS instance will use the 2382 port.

    In order to connect to a named instance of SSAS, we can use the format of [Server name{:[Port], in my case I have used [WIN2K8R2-DBIA \SQL2K12DE:1453].

  4. Bear in mind that you will need to open the port assigned here in your firewall for TCP/IP traffic. If you leave the default value at 0, Analysis Services will use port 2382.

    Note

    To encrypt the cube transactions on the network, we can use the Internet Protocol Security (IPSec) method to achieve the encryption. Refer to this link for a step-by-step guide (http://technet.microsoft.com/en-us/library/bb742429.aspx).

  5. Further, to ensure that all administrative data is encrypted:

    1. Under the Analysis Server Properties page, scroll down to Security \AdministrativeDataProtection\RequiredProtectionLevel and ensure the value is set to 1. Do not allow either 0 or 2, which is a lower level of security having no encryption for data transmission.

    2. Under the Analysis Server Properties page, scroll down to Security \DataProtection RequiredProtectionLevel and ensure the value is set to 1. Do not allow either 0 or 2, which is a lower level of security having no encryption for data transmission.

    3. Under the Analysis Server Properties page, scroll down to Network \ Request \EnableCompression and ensure the value is set to True. The EnableCompression value is shown under the Network \ Request and Network Responses row.

How it works...

As we have followed the necessary steps to secure the BI platform, this section will explain the key points about why it is essential.

The best option to secure the cube data is to encrypt the filesystem used to store cubes. The SSAS service is executed using the msmdsrv.exe executable file that runs in the operating system. Every instance of SSAS is independent of each other on the same Windows server, having its own configuration settings stored under the msmdsrv.ini file. Any configuration changes for each instance, such as permissions, ports, file storage, server mode properties, and startup accounts, are different and can be configured separately.

The storage and memory architecture has been enhanced and redefined in the 2012 version.

Microsoft documentation states that:

A server that runs in multidimensional mode uses the resource management layer that was built for multidimensional cube databases and data mining models. In contrast, Tabular server mode uses the xVelocity in-memory analytics engine (VertiPaq) and data compression to aggregate data as it is requested.

Note

Based on the configuration settings, each instance of Analysis Services runs either tabular or multidimensional databases, but not both. And the server mode property is best to determine which type of database runs on the instance.

The server mode can be set up during the installation, and in order to run multiple modes on the same server we can install SSAS as multiple instances. As a general rule, most administrative tasks you must perform do not vary by mode. As an Analysis Services system administrator, you can use the same procedures and scripts to manage any Analysis Services instance on your network regardless of how it was installed.

If you have configured Analysis Services to communicate over HTTP, the communication can be secured using the SSL protocol. However, be aware that you may have to acquire a certificate to use SSL encryption over public networks. Also, note that SSL encryption normally uses port 443, and not port 80, to communicate. This difference may require changes in the firewall configuration.

Using the HTTP protocol also allows you to run secured lines to parties outside the corporate network—for example, in an extranet setup.

More information – section 1

As we have seen, when it comes to managing SSAS instance configuration using the GUI options, the instance configuration can be managed using the .ini file from the specified instance. Let us work out the steps as follows:

  1. On the server, where the SSAS Service instance is installed, open Windows Explorer to verify the location of Analysis Services program files or search for the msmdsrv.ini file.

    Note

    When SSAS is installed as the default instance, the aforementioned file can be found in the %\Program Files\Microsoft SQL Server\MSAS11.MSSQLSERVER\OLAP\Config folder. Ensure that the msmdsrv.ini file is backed up before performing any changes.

  2. Open the file using notepad.exe or any other text editor.

  3. Ensure that you restart SQL Server Analysis Services (SSAS) once the file is modified and saved to bring about the new changes.