Chapter 4

Data Virtualization ServerManagement and Security

4.1 Introduction

This chapter is also devoted to the workings of a data virtualization server. Chapter 3 deals with the concepts used by the designers and developers to set up virtual tables, mappings, and so on. When an environment is up and running, it has to be managed, and security aspects have to be defined. That’s the topic of this chapter. These tasks are normally handled by an administrator. The following topics are addressed in this chapter:

• Impact and lineage analysis

• Synchronization of wrapper tables and source tables

• Security of data

• Monitoring, management, and administration

4.2 Impact and Lineage Analysis

A large business intelligence system may consist of ...

Get Data Virtualization for Business Intelligence Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.