Security - Managing Your Users and Their Access

So far in MicroStrategy, we have covered a good amount of Schema and Public or Application Objects. It is time now to switch gears and explore objects that will allow administrators to deploy a security layer in MicroStrategy by controlling user privileges and user access to Projects and to specific objects. These objects are part of the MicroStrategy Configuration Objects.

The following topics will be covered:

  • MicroStrategy Configuration Objects
  • MicroStrategy Users and User Groups and how to create them
  • MicroStrategy privileges
  • What a MicroStrategy Security Role is and how to create one and assign it
  • What a MicroStrategy Security Filter is and how to create one and assign it
  • MicroStrategy permissions
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.118.229