Chapter 4

Data Virtualization ServerManagement and Security

4.1 Introduction

This chapter is also devoted to the workings of a data virtualization server. Chapter 3 deals with the concepts used by the designers and developers to set up virtual tables, mappings, and so on. When an environment is up and running, it has to be managed, and security aspects have to be defined. That’s the topic of this chapter. These tasks are normally handled by an administrator. The following topics are addressed in this chapter:

• Impact and lineage analysis

• Synchronization of wrapper tables and source tables

• Security of data

• Monitoring, management, and administration

4.2 Impact and Lineage Analysis

A large business intelligence system may consist of ...

Get Data Virtualization for Business Intelligence Systems now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.