This course explains the role-based security architecture of multidimensional and tabular models in SQL Server Analysis Services. You learn how to configure user or administrative access and granular security for conditional restrictive access.
After you put a SQL Server Analysis Services multidimensional or tabular model into production, you need to manage what users can see and what users can do when interacting with the model. In this course, Securing SSAS Models, you will learn the options you have for implementing security. First, you will discover how default security works prior to explicitly configuring security, and then you will learn which tools you have at your disposal for managing security during development and following deployment to production. You will then explore the various security roles and test the effect of implementing each role type. Next, you will learn how to restrict roles from viewing sections of a model by using the security user interface. In addition, you will see firsthand what can happen when a user is assigned to multiple roles. Finally, you will walk through the process of implementing dynamic security to manage restrictions by using a table-driven approach. When you are finished with this course, you will have the needed skills and knowledge of Analysis Services security to properly set up security for your own models.
Stacia Misner Varga is a consultant, instructor, author, mentor, BI Partner for SQLSkills, and principal of Data Inspirations specializing in Microsoft business intelligence technologies for over 10 years. She is a frequent speaker at the PASS Summit, IT/Dev Connections
conferences, and various SQL Saturday and Microsoft-related events
Course Overview [Autogenerated] Hi, everyone. My name is SSHD Azure Varga, and welcome to my course. Securing SSH is models. I'm a consultant and author at Data Inspirations. We built multi dimensional and tabular models so that people can interact with those models. But we want to make sure that people can only do and see what they're supposed to be able to do and see. In this course, we're going to go through all the options that you have for implementing security and analysis services. Some of the major topics that we're going to cover include the role based security architectures of analysis services, the types of permissions that you can assign which objects within the models could be secured, problems to avoid when implementing multiple roles. And an optional table driven approach to managing security definitions. By the end of this course, you'll know how to properly create and implement a plan for securing analysis services models. Before beginning this course, you should already know how to create windows, Loggins and groups. You should be familiar with the development and deployment tasks for the type of analysis services model that you want to secure either multidimensional or tabular, and you should have a general familiarity with their expression languages MDX or Dax, respectively. I hope you'll join me on this journey to learn how to properly implement security with the securing SSH s Models course at Pluralsight.