This course explains the role-based security architecture of multidimensional and tabular models in SQL Server Analysis Services. You learn how to configure user or administrative access and granular security for conditional restrictive access.
After you put a SQL Server Analysis Services multidimensional or tabular model into production, you need to manage what users can see and what users can do when interacting with the model. In this course, Securing SSAS Models, you will learn the options you have for implementing security. First, you will discover how default security works prior to explicitly configuring security, and then you will learn which tools you have at your disposal for managing security during development and following deployment to production. You will then explore the various security roles and test the effect of implementing each role type. Next, you will learn how to restrict roles from viewing sections of a model by using the security user interface. In addition, you will see firsthand what can happen when a user is assigned to multiple roles. Finally, you will walk through the process of implementing dynamic security to manage restrictions by using a table-driven approach. When you are finished with this course, you will have the needed skills and knowledge of Analysis Services security to properly set up security for your own models.
Stacia Misner Varga is an instructor, author, and principal consultant of Data Inspirations. Her career spans more than 30 years, with a focus on improving business practices through technology. Since 2000, she has provided consulting and education services for Microsoft’s data platform and authored or co-authored many books covering this topic. In addition, Stacia has been a frequent speaker over the years at technology conferences worldwide.
Course Overview [Autogenerated] Hi, everyone. My name is SSHD Azure Varga, and welcome to my course. Securing SSH is models. I'm a consultant and author at Data Inspirations. We built multi dimensional and tabular models so that people can interact with those models. But we want to make sure that people can only do and see what they're supposed to be able to do and see. In this course, we're going to go through all the options that you have for implementing security and analysis services. Some of the major topics that we're going to cover include the role based security architectures of analysis services, the types of permissions that you can assign which objects within the models could be secured, problems to avoid when implementing multiple roles. And an optional table driven approach to managing security definitions. By the end of this course, you'll know how to properly create and implement a plan for securing analysis services models. Before beginning this course, you should already know how to create windows, Loggins and groups. You should be familiar with the development and deployment tasks for the type of analysis services model that you want to secure either multidimensional or tabular, and you should have a general familiarity with their expression languages MDX or Dax, respectively. I hope you'll join me on this journey to learn how to properly implement security with the securing SSH s Models course at Pluralsight.