December 2013
Intermediate to advanced
1872 pages
153h 31m
English
Security is straightforward in SSAS. For each database or cube, roles are identified with varying levels of granularity for users. Roles are used when accessing the data in cubes. The process works like this: A role is defined, and then an individual user or group who is a member of that role is assigned that role. To create the roles you need for this data, you right-click on the Roles entry in the Solution Explorer and select New Role. Figure 53.71 shows the creation of a database role with process database and read definition permissions.
FIGURE 53.71 Creating a database role and permissions in the role designer.
The other ...