Skip to Content
Microsoft® SQL Server® 2008 MDX Step by Step
book

Microsoft® SQL Server® 2008 MDX Step by Step

by C Ryan Clay Bryan C Smith and Hitachi Consulting
February 2009
Beginner to intermediate content levelBeginner to intermediate
400 pages
9h 59m
English
Microsoft Press
Content preview from Microsoft® SQL Server® 2008 MDX Step by Step

Chapter 11. Implementing Dynamic Security

After completing this chapter, you will be able to:

  • Retrieve the current user’s Windows identity using MDX

  • Employ the current user’s identity to restrict access to hierarchies

  • Employ the current user’s identity to restrict access to cell data

Membership in a database role determines an end user’s access to Analysis Services data. Through a role, access to particular members of an attribute-hierarchy or even the individual cells of a cube may be controlled using MDX expressions. When an end user’s identity is part of the logic of these expressions, a role is said to employ dynamic security.

The purpose of this chapter is to introduce you to the implementation of dynamic security. It is assumed you are familiar ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Microsoft® SQL Server® 2008 Analysis Services Step by Step

Microsoft® SQL Server® 2008 Analysis Services Step by Step

Scott Cameron
Professional Microsoft® SQL Server® Analysis Services 2008 with MDX

Professional Microsoft® SQL Server® Analysis Services 2008 with MDX

Sivakumar Harinath, Matt Carroll, Sethu Meenakshisundaram, Robert Zare, Denny Guang-Yeu Lee

Publisher Resources

ISBN: 9780735626188Purchase book