Blackberry PEARL 8200 - PEARL 8220 SMARTPHONE - SAFETY AND Service Manual Page 158

  • Download
  • Add to my manuals
  • Print
  • Page
    / 186
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 157
Additional Security Configurations MicroStrategy Mobile Suite
5
150 Configuring security © 2012 MicroStrategy, Inc.
You can control access to your MicroStrategy project in three ways:
•Privileges control what functionality in the MicroStrategy system the
user has access to. For example, a user who does not have the Use Metric
Editor privilege cannot create or edit metrics. Privileges are assigned to
the user’s account by right-clicking the user and selecting Edit.
Security filters control what data the user has access to. For example, a
user who has a security filter that restricts him to only the California
Central Region element of the Region attribute cannot view any data for
any other state. Security filters are assigned to the user’s account by
right-clicking the user in MicroStrategy Desktop and selecting Edit.
Permissions control what objects in the MicroStrategy system the user
has access to. For example, a user who has the Write permission for a
metric can make changes to the metric’s definition, while a user who only
has the Execute permission can run reports containing the metric but
cannot change that metric.
Each MicroStrategy object has an access control list (ACL), which
specifies the permissions that each MicroStrategy user has for that object.
Permissions are assigned to the objects in MicroStrategy by right-clicking
the object, selecting Properties, and then selecting Security.
MicroStrategy Mobile Suite users can be organized into user groups for
convenient administration. User groups can be granted privileges, security
filters, and permissions in the same way as individual users. A user can be a
member of multiple groups, and inherit the security settings from each
group.
For complete details related to user and object security, see the Setting Up
User Security chapter in the MicroStrategy System Administration Guide.
To create a user and configure its security profile
1 If you need to log in again, in MicroStrategy Desktop log in to the project
source you create. For information on connecting to a data source, see
To
establish an Intelligence Server connection to the metadata repository,
page 25.
Page view 157
1 2 ... 153 154 155 156 157 158 159 160 161 162 163 ... 185 186

Comments to this Manuals

No comments