官术网_书友最值得收藏!

How it works...

The preceding steps enable us to create the necessary security roles that are essential to manage security in Analysis Services objects and data.

The steps to create a specific security role within analytical databases needs elaboration, as it is different from the Server role and the Database role from the relational database world. Similarly, security roles also play very important roles in the SSAS world.

To manage security for Analysis Services objects and data, a role can be associated to the SIDs of Windows operating system users and groups that have specific access rights and permissions defined for the objects managed by SSAS instance.

The two different types of permissions that can be granted to a user are classified as Administrative Security and Data Security. Again such a level of permissions varies from the object of an Analysis Services Database. For instance a user can be granted to execute Local Cube read permissions on the Data Security level and Read Definition on the Administrative Security level.

Security is managed by using roles and permissions. Roles are groups of users and users can be referred to as members. Such members can be added or removed from the roles.

Permissions that are specified by roles can use the objects for which that role has permissions, as they apply to all the members in a role who have equal permissions to the objects. Also, the permissions collection of the object has a single role assigned to it.

主站蜘蛛池模板: 灵丘县| 武平县| 宁明县| 多伦县| 赤峰市| 应城市| 宜良县| 集贤县| 兰溪市| 中山市| 武宁县| 宜昌市| 定南县| 方山县| 墨竹工卡县| 淮南市| 平乡县| 儋州市| 黔西县| 大宁县| 封丘县| 丰都县| 龙井市| 罗山县| 云梦县| 独山县| 略阳县| 巍山| 泰兴市| 双牌县| 开化县| 个旧市| 康马县| 景德镇市| 临猗县| 阜城县| 藁城市| 乌拉特后旗| 建始县| 铁力市| 西丰县|