September 2018
Beginner
218 pages
5h 2m
English
So far in MicroStrategy, we have covered a good amount of Schema and Public or Application Objects. It is time now to switch gears and explore objects that will allow administrators to deploy a security layer in MicroStrategy by controlling user privileges and user access to Projects and to specific objects. These objects are part of the MicroStrategy Configuration Objects.
The following topics will be covered:
Read now
Unlock full access