SlideShare une entreprise Scribd logo
1  sur  33
Necto Training
Module 9: Necto
Architecture and
Security
Agenda

   Necto Architecture
   Necto Security
Server Architecture
Prerequisites


                   Necto Software
         IIS




                                        Analysis
Client                                  Server

                                                    Data
               Necto Server         Customer Data   Warehouse



                  Windows 2008

                 Necto Server
BI Services

 BI Display                                    BI Calculations

                        Necto Software

                    NovaView.aspx     BI
                                      Server
              IIS




                                                          Analysis
Client                                                    Server

                                                                     Data
                    Necto Server                    Customer Data    Warehouse



                       Windows 2008

                      Necto Server
Administrative Services
                                          Administration of:
                                           • Workboard trees
                                           • Social
                                           • Users and roles
                   Necto Software
                                           • Etc.
               NovaView.aspx     BI
                                 Server
         IIS




               Admin Web         Admin           Analysis
               Services          Server          Server
Client
                                 Social
                                                               Data
               Necto Server                 Customer Data      Warehouse



                  Windows 2008

                 Necto Server
Necto Server Data Calculation and Storage
         Can use SQL
         express installed
                                              or
         with Necto
                                SQL Express                Necto DB
                                                     SQL Server
                      Necto Software

                 NovaView.aspx      BI              Necto Calculations
                                    Server               Server/s
           IIS




                                                                  Recommended:
                 Admin web          Admin
                                                                  separate SQL
                 services           Server
Client                                                            servers
                                    Social

                 Necto Server                      Both BI and Admin
                                                   servers use this
                                                   work area
                    Windows 2008

                   Necto Server
Universal Data Connector (UDC)
                                                 Provides connection to
                                                 additional data sources


                      Necto Software

                  NovaView.aspx      BI
                                     Server
            IIS




                  Admin Web          Admin              Analysis
                  Services           Server             Server
Client
                                     Social
                                                                           Data
                  Necto Server       UDC          Customer data            Warehouse
                                     LB
   Performs load balancing                              Analysis
   of UDC requests    Windows 2008                      Services
                                                        instance           Data
                    Necto Server
                                                         SQL               Sources
                                 Creates and
                                 updates cubes           UDC
Necto Architecture Summary

                              SQL Express         Necto DB
                                             SQL Server
                   Necto Software

               NovaView.aspx      BI        Necto Calculations
                                  Server         Server/s
         IIS




               Admin Web          Admin           Analysis
               Services           Server          Server
Client
                                  Social
                                                                 Data
               Necto Server       UDC        Customer Data       Warehouse
                                  LB
                                                  Analysis
                  Windows 2008                    Services
                                                  instance       Data
                 Necto Server
                                                   SQL           Sources

                                                   UDC
Security
Security Overview
                                Content              Data (OLAP )
                                Security             Security




• Can be              Roles
  implemented by
  user name or by
  the role the user
  belongs to

                      Users


                              • Which             • Which portions of the
                                workboards will     data will be available
                                be available      • Defined in terms of
                                                    Dimensions and
                                                    Members
Content    Data (OLAP )
                 Security   Security




         Roles




         Users



OLAP Security
Data (OLAP) Security

  Users are added to roles in a
  SSAS cube                         OLAP    Domain
                                            Users
  Roles specify which objects
  and members will be available     Roles
  to users
  Users must be part of an Active            Groups
  Directory domain and imported
  into Necto Dashboard
                                            User
                                               User
                                                  User
Users and Roles
OLAP            Domain                            Necto         Roles can be
                                                                added manually
                Users
 Roles                              Import
                                                      Roles


                  Groups                     Groups



                 User
                    User
                       User


                                        Domain         Server    Necto
         When an active directory        Users         Users     Users
         user logs into Necto – a
         user is created in Necto             From Necto           Manually
                                              Server               defined
Data (OLAP) Security
                                             Necto
  Users are added to roles in a
  SSAS cube
                                               Roles
  Roles specify which objects
  and members will be available
  to users                            Groups

  Users must be part of an Active
  Directory domain and imported
  into NovaView Dashboard
  Necto and Server users can be
  mapped to domain users            Domain      Server   Necto
                                     Users      Users    Users
     For example: a guest user
Role vs. User Based Security
                             Content    Data (OLAP )
                             Security   Security




Both security        Roles
methods can be
implemented per
role or per user.
What should I use?



                     Users
Role vs. User Based Security

  Connection to data source is defined by:
    Server, database, cube, security (Role or User)
  Role-based security enables reuse of
  connection
     Better efficiency of Necto and AS




           Necto                         Analysis
           Server                         Server
Content    Data (OLAP )
                   Security   Security




         Roles




         Users



Content Security
Content Security

                      Public Workboards
                          Access rights (permissions) are
                          assigned by administrator per role
                      Private folders
                          Per user
                          User can share with users or roles
                      Shared folders of other users


            Best Practice:
             • Public folders – view-only for most
                users
             • Users should create new
                workboards in their private folder
Content Permissions Levels

Name     Weight   Description

                  All administrative rights, including giving rights to
Admin    5
                  others
                  The user will see that the workboard exists
Deny     4
                  but will not be able to view it
                  User will be allowed to change and edit the
Write    3
                  workboard

Read     2        View only

                  The user will not see that the Workboard exists
Hidden   1        Therefore will not be able to access it

                  No permission has been assigned. Permissions
None     0
                  will be inherited from parent folder
User James Part of Role A

Role A = Permission
Admin

            Permission = Inherit
            Admin




                                   Admin    5
                                   Deny     4
                                   Write    3
                                   Read     2
                                   Hidden   1
                                   None     0
Breaking Inheritance
If Same Role Take Last, Unless Admin
Role A = Permission
Admin
        Role A = Permission                  Same Role, Take Last,
        Hidden                               Unless Admin
                      Permission – Inherit
                      Admin

Role A = Permission
Read
        Role A = Permission
                                             Same Role, Take Last
        Hidden
                      Permission – Inherit
                      Hidden
                                                             Admin    5
Role A = Permission
Read                                                         Deny     4
         Role A = Permission                 Same Role,      Write    3
         Deny
                                             Take Last       Read     2
                      Permission – Inherit
                      Deny                                   Hidden   1
                                                             None     0
Combining Hierarchies – User
James is Member of Role A & B
Role A = Permission
Admin
        Role B = Permission                  MAX(Admin,
        Hidden
                      Permission – Inherit
                                             Hidden)
                      Admin

Role A = Permission
Read
        Role B = Permission                  MAX(Read, Hidden)
        Hidden
                      Permission – Inherit
                      Read
                                                          Admin    5
Role A = Permission
Read                                                      Deny     4
         Role B = Permission                 MAX(Read,    Write    3
         Deny
                      Permission – Inherit
                                             Deny)        Read     2
                      Deny                                Hidden   1
                                                          None     0
Breaking & Combining Hierarchies
First Break Then Combine
 Role A = Permission
 Hidden

   Role A = Permission           Role B = Permission         Role C = Permission
   Read                          Admin                       Read

      Role A = Permission           Role B = Permission         Role C = Permission
      Hidden                        Admin                       Hidden

          Role A = Permission          Role B = Permission
          Deny                         Read

             Role A = Permission          Role B = Permission
             Admin                        Hidden

               Role A = Permission             Role B = Permission
               Read                            Deny
                                                                                   Admin    5
                   Role A = Permission
                   Hidden                                                          Deny     4

                         Role A = Permission        Role B = Permission
                                                                                   Write    3
                         Deny                       Read                           Read     2
                                                                                   Hidden   1
                                                                                   None     0
Remove

  Remove any role that James is not a part
  of
Removing Role C
“James is a Member of Role A & B”
 Role A = Permission
 Hidden

   Role A = Permission           Role B = Permission         Role C = Permission
   Read                          Admin                       Read

      Role A = Permission           Role B = Permission         Role C = Permission
      Hidden                        Admin                       Hidden

          Role A = Permission          Role B = Permission
          Deny                         Read

             Role A = Permission          Role B = Permission
             Admin                        Hidden

               Role A = Permission             Role B = Permission
               Read                            Deny
                                                                                   Admin    5
                   Role A = Permission
                   Hidden                                                          Deny     4

                         Role A = Permission        Role B = Permission
                                                                                   Write    3
                         Deny                       Read                           Read     2
                                                                                   Hidden   1
                                                                                   None     0
Break Hierarchy

  In each role use
    Thumb Rule 1: Break Hierarchy
 “Use last folder permission unless Root = Admin”
Breaking Hierarchies
“Use last folder permission unless Root = Admin”
Role A = Permission
Hidden

  Role A = Permission           Role B = Permission
  Read                          Admin

     Role A = Permission           Role B = Permission
     Hidden                        Admin

         Role A = Permission          Role B = Permission
         Deny                         Read

            Role A = Permission          Role B = Permission
            Admin                        Hidden

              Role A = Permission             Role B = Permission
              Read                            Deny
                                                                         Admin    5
                  Role A = Permission
                  Hidden                                                 Deny     4

                        Role A = Permission        Role B = Permission
                                                                         Write    3
                        Deny                       Read                  Read     2
                        Role A = Permission        Role B = Permission
                                                                         Hidden   1
                        Deny                       Admin                 None     0
Combine

  The highest permission is selected
Combining Hierarchies
”The highest permission is selected”
 Role A = Permission
 Hidden

   Role A = Permission           Role B = Permission
   Read                          Admin

      Role A = Permission           Role B = Permission
      Hidden                        Admin

          Role A = Permission          Role B = Permission
          Deny                         Read

             Role A = Permission          Role B = Permission
             Admin                        Hidden

               Role A = Permission             Role B = Permission
               Read                            Deny
                                                                          Admin    5
                   Role A = Permission
                   Hidden                                                 Deny     4

                         Role A = Permission        Role B = Permission
                                                                          Write    3
                         Deny                       Read                  Read     2
                         Role A = Permission        Role B = Permission
                                                                          Hidden   1
                         Deny                       Admin                 None     0
Breaking & Combining Hierarchies
First Break, Then Combine
 Role A = Permission
 Hidden

   Role A = Permission           Role B = Permission
   Read                          Admin

      Role A = Permission           Role B = Permission
      Hidden                        Admin

          Role A = Permission          Role B = Permission
          Deny                         Read

             Role A = Permission          Role B = Permission
             Admin                        Hidden

               Role A = Permission             Role B = Permission
               Read                            Deny
                                                                          Admin    5
                   Role A = Permission
                   Hidden                                                 Deny     4

                         Role A = Permission        Role B = Permission
                                                                          Write    3
                         Deny                       Read                  Read     2
                                        Permission – Inherit
                                        Admin
                                                                          Hidden   1
                                                                          None     0
Summary

  In this lesson you have learned about:
    Necto Architecture
    Necto Security
Thank you
Any Questions?

Contenu connexe

Tendances

Bi For It Professionals Part 3 Building And Querying Multidimensional Cubes
Bi For It Professionals Part 3   Building And Querying Multidimensional CubesBi For It Professionals Part 3   Building And Querying Multidimensional Cubes
Bi For It Professionals Part 3 Building And Querying Multidimensional CubesMicrosoft TechNet
 
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)Carles Farré
 
SQL Server 2008 Highlights
SQL Server 2008 HighlightsSQL Server 2008 Highlights
SQL Server 2008 HighlightsIntergen
 
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90Microsoft TechNet
 
01 necto introduction_ready
01 necto introduction_ready01 necto introduction_ready
01 necto introduction_readywww.panorama.com
 
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...Fabrizio Volpe
 
An overview of Microsoft data mining technology
An overview of Microsoft data mining technologyAn overview of Microsoft data mining technology
An overview of Microsoft data mining technologyMark Tabladillo
 
An overview of microsoft data mining technology
An overview of microsoft data mining technologyAn overview of microsoft data mining technology
An overview of microsoft data mining technologyMark Tabladillo
 
The Art & Sience of Optimization
The Art & Sience of OptimizationThe Art & Sience of Optimization
The Art & Sience of OptimizationHertzel Karbasi
 
Microsoft SQL Server - SQL Server 2008 R2 Editions Datasheet
Microsoft SQL Server - SQL Server 2008 R2 Editions DatasheetMicrosoft SQL Server - SQL Server 2008 R2 Editions Datasheet
Microsoft SQL Server - SQL Server 2008 R2 Editions DatasheetMicrosoft Private Cloud
 
Enabling End User And Ad Hoc Reporting With M S S Q L Server 2005 R...
Enabling  End  User And  Ad  Hoc  Reporting  With  M S  S Q L  Server 2005  R...Enabling  End  User And  Ad  Hoc  Reporting  With  M S  S Q L  Server 2005  R...
Enabling End User And Ad Hoc Reporting With M S S Q L Server 2005 R...Joseph Lopez
 
KBK Group Skolkovo Investor Presentation
KBK Group Skolkovo Investor PresentationKBK Group Skolkovo Investor Presentation
KBK Group Skolkovo Investor PresentationImmense Lab
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibilityeladgotfrid
 

Tendances (20)

Bi For It Professionals Part 3 Building And Querying Multidimensional Cubes
Bi For It Professionals Part 3   Building And Querying Multidimensional CubesBi For It Professionals Part 3   Building And Querying Multidimensional Cubes
Bi For It Professionals Part 3 Building And Querying Multidimensional Cubes
 
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
[DSBW Spring 2009] Unit 07: WebApp Design Patterns & Frameworks (2/3)
 
SQL Server 2008 Highlights
SQL Server 2008 HighlightsSQL Server 2008 Highlights
SQL Server 2008 Highlights
 
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
Business Intelligence For It Professionals Part 2 Seamless Data Integration 90
 
01 necto introduction_ready
01 necto introduction_ready01 necto introduction_ready
01 necto introduction_ready
 
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
 
An overview of Microsoft data mining technology
An overview of Microsoft data mining technologyAn overview of Microsoft data mining technology
An overview of Microsoft data mining technology
 
An overview of microsoft data mining technology
An overview of microsoft data mining technologyAn overview of microsoft data mining technology
An overview of microsoft data mining technology
 
The Art & Sience of Optimization
The Art & Sience of OptimizationThe Art & Sience of Optimization
The Art & Sience of Optimization
 
VDI in Windows Server 2012
VDI in Windows Server 2012VDI in Windows Server 2012
VDI in Windows Server 2012
 
Microsoft SQL Server - SQL Server 2008 R2 Editions Datasheet
Microsoft SQL Server - SQL Server 2008 R2 Editions DatasheetMicrosoft SQL Server - SQL Server 2008 R2 Editions Datasheet
Microsoft SQL Server - SQL Server 2008 R2 Editions Datasheet
 
Confio presentation
Confio presentationConfio presentation
Confio presentation
 
From the fire hose series an insider’s guide to desktop virtualization
From the fire hose series an insider’s guide to desktop virtualization From the fire hose series an insider’s guide to desktop virtualization
From the fire hose series an insider’s guide to desktop virtualization
 
Grottarossa:Why?
Grottarossa:Why?Grottarossa:Why?
Grottarossa:Why?
 
Unit 05: Physical Architecture Design
Unit 05: Physical Architecture DesignUnit 05: Physical Architecture Design
Unit 05: Physical Architecture Design
 
Proclarity
ProclarityProclarity
Proclarity
 
Enabling End User And Ad Hoc Reporting With M S S Q L Server 2005 R...
Enabling  End  User And  Ad  Hoc  Reporting  With  M S  S Q L  Server 2005  R...Enabling  End  User And  Ad  Hoc  Reporting  With  M S  S Q L  Server 2005  R...
Enabling End User And Ad Hoc Reporting With M S S Q L Server 2005 R...
 
KBK Group Skolkovo Investor Presentation
KBK Group Skolkovo Investor PresentationKBK Group Skolkovo Investor Presentation
KBK Group Skolkovo Investor Presentation
 
Unit 07: Design Patterns and Frameworks (2/3)
Unit 07: Design Patterns and Frameworks (2/3)Unit 07: Design Patterns and Frameworks (2/3)
Unit 07: Design Patterns and Frameworks (2/3)
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibility
 

En vedette

En vedette (20)

11 necto installation_ready
11 necto installation_ready11 necto installation_ready
11 necto installation_ready
 
Panorama BI 3.0 for Financial services
Panorama BI 3.0 for Financial servicesPanorama BI 3.0 for Financial services
Panorama BI 3.0 for Financial services
 
04 necto analytics_basics_ready
04 necto analytics_basics_ready04 necto analytics_basics_ready
04 necto analytics_basics_ready
 
Prioritizing For Profit at Agile 08
Prioritizing For Profit at Agile 08Prioritizing For Profit at Agile 08
Prioritizing For Profit at Agile 08
 
Translation Engine
Translation EngineTranslation Engine
Translation Engine
 
AUX Cities
AUX CitiesAUX Cities
AUX Cities
 
Presentation Skills - Session One
Presentation Skills - Session OnePresentation Skills - Session One
Presentation Skills - Session One
 
mele's Eport-folio
mele's Eport-foliomele's Eport-folio
mele's Eport-folio
 
Klimatstrategimall
KlimatstrategimallKlimatstrategimall
Klimatstrategimall
 
Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10
 
Brand Nahamani
Brand NahamaniBrand Nahamani
Brand Nahamani
 
開啟Q9 Ue版九方
開啟Q9 Ue版九方開啟Q9 Ue版九方
開啟Q9 Ue版九方
 
Y5cafe introduction
Y5cafe introductionY5cafe introduction
Y5cafe introduction
 
Slideshow My Prato
Slideshow My PratoSlideshow My Prato
Slideshow My Prato
 
Interior Design: Easy Ways to Add Flash Without Wasting Cash
Interior Design: Easy Ways to Add Flash Without Wasting Cash Interior Design: Easy Ways to Add Flash Without Wasting Cash
Interior Design: Easy Ways to Add Flash Without Wasting Cash
 
Codename Astm1
Codename Astm1Codename Astm1
Codename Astm1
 
Unenclosable
UnenclosableUnenclosable
Unenclosable
 
Webinar2
Webinar2Webinar2
Webinar2
 
seequence
seequenceseequence
seequence
 
WPC 2012: Panorama Software for SQL Server 2012
WPC 2012: Panorama Software for SQL Server 2012  WPC 2012: Panorama Software for SQL Server 2012
WPC 2012: Panorama Software for SQL Server 2012
 

Similaire à 09 necto architecture_ready

SQL Server 2008 R2 Parallel Data Warehouse
SQL Server 2008 R2 Parallel Data WarehouseSQL Server 2008 R2 Parallel Data Warehouse
SQL Server 2008 R2 Parallel Data WarehouseMark Ginnebaugh
 
SharePoint 2010 as a Development Platform
SharePoint 2010 as a Development PlatformSharePoint 2010 as a Development Platform
SharePoint 2010 as a Development PlatformAyman El-Hattab
 
BI Dashboards with SQL Server 2008 R2
BI Dashboards with SQL Server 2008 R2BI Dashboards with SQL Server 2008 R2
BI Dashboards with SQL Server 2008 R2Eduardo Castro
 
BI Dashboards with SQL Server
BI Dashboards with SQL ServerBI Dashboards with SQL Server
BI Dashboards with SQL ServerEduardo Castro
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerAdvanced Logic Industries
 
DV03 Smooth Migration to Windows Azure
DV03 Smooth Migration to Windows AzureDV03 Smooth Migration to Windows Azure
DV03 Smooth Migration to Windows AzureRonald Widha
 
SQL Server Developer 70-433
SQL Server Developer 70-433SQL Server Developer 70-433
SQL Server Developer 70-433jasonyousef
 
Denny Lee\'s Data Camp v1.0 talk on SSRS Best Practices for IT
Denny Lee\'s Data Camp v1.0 talk on SSRS Best Practices for ITDenny Lee\'s Data Camp v1.0 talk on SSRS Best Practices for IT
Denny Lee\'s Data Camp v1.0 talk on SSRS Best Practices for ITBala Subra
 
Business Intelligence in SharePoint 2013 by Jason Himmelstein - SPTechCon
Business Intelligence in SharePoint 2013 by Jason Himmelstein - SPTechConBusiness Intelligence in SharePoint 2013 by Jason Himmelstein - SPTechCon
Business Intelligence in SharePoint 2013 by Jason Himmelstein - SPTechConSPTechCon
 
Business intelligence in SharePoint 2013
Business intelligence in SharePoint 2013Business intelligence in SharePoint 2013
Business intelligence in SharePoint 2013Jason Himmelstein
 
Virtualization Map Tech Ed2009
Virtualization Map Tech Ed2009Virtualization Map Tech Ed2009
Virtualization Map Tech Ed2009rsnarayanan
 
In De Wolken Met Cloud Computing
In De Wolken Met Cloud ComputingIn De Wolken Met Cloud Computing
In De Wolken Met Cloud ComputingAnko Duizer
 
SQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesSQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesDenny Lee
 
The IBM Netezza datawarehouse appliance
The IBM Netezza datawarehouse applianceThe IBM Netezza datawarehouse appliance
The IBM Netezza datawarehouse applianceIBM Danmark
 
Cisco entel summit2010
Cisco entel summit2010Cisco entel summit2010
Cisco entel summit2010Entel
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architectureWiliam Ferraciolli
 
Sql azure data services OData
Sql azure data services ODataSql azure data services OData
Sql azure data services ODataEduardo Castro
 

Similaire à 09 necto architecture_ready (20)

SQL Server 2008 R2 Parallel Data Warehouse
SQL Server 2008 R2 Parallel Data WarehouseSQL Server 2008 R2 Parallel Data Warehouse
SQL Server 2008 R2 Parallel Data Warehouse
 
SharePoint 2010 as a Development Platform
SharePoint 2010 as a Development PlatformSharePoint 2010 as a Development Platform
SharePoint 2010 as a Development Platform
 
BI Dashboards with SQL Server 2008 R2
BI Dashboards with SQL Server 2008 R2BI Dashboards with SQL Server 2008 R2
BI Dashboards with SQL Server 2008 R2
 
BI Dashboards with SQL Server
BI Dashboards with SQL ServerBI Dashboards with SQL Server
BI Dashboards with SQL Server
 
COGNOS Vs OBIEE
COGNOS Vs OBIEECOGNOS Vs OBIEE
COGNOS Vs OBIEE
 
Microsoft Certification Roadmap for Students
Microsoft Certification Roadmap for StudentsMicrosoft Certification Roadmap for Students
Microsoft Certification Roadmap for Students
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManager
 
DV03 Smooth Migration to Windows Azure
DV03 Smooth Migration to Windows AzureDV03 Smooth Migration to Windows Azure
DV03 Smooth Migration to Windows Azure
 
Data In Cloud
Data In CloudData In Cloud
Data In Cloud
 
SQL Server Developer 70-433
SQL Server Developer 70-433SQL Server Developer 70-433
SQL Server Developer 70-433
 
Denny Lee\'s Data Camp v1.0 talk on SSRS Best Practices for IT
Denny Lee\'s Data Camp v1.0 talk on SSRS Best Practices for ITDenny Lee\'s Data Camp v1.0 talk on SSRS Best Practices for IT
Denny Lee\'s Data Camp v1.0 talk on SSRS Best Practices for IT
 
Business Intelligence in SharePoint 2013 by Jason Himmelstein - SPTechCon
Business Intelligence in SharePoint 2013 by Jason Himmelstein - SPTechConBusiness Intelligence in SharePoint 2013 by Jason Himmelstein - SPTechCon
Business Intelligence in SharePoint 2013 by Jason Himmelstein - SPTechCon
 
Business intelligence in SharePoint 2013
Business intelligence in SharePoint 2013Business intelligence in SharePoint 2013
Business intelligence in SharePoint 2013
 
Virtualization Map Tech Ed2009
Virtualization Map Tech Ed2009Virtualization Map Tech Ed2009
Virtualization Map Tech Ed2009
 
In De Wolken Met Cloud Computing
In De Wolken Met Cloud ComputingIn De Wolken Met Cloud Computing
In De Wolken Met Cloud Computing
 
SQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesSQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best Practices
 
The IBM Netezza datawarehouse appliance
The IBM Netezza datawarehouse applianceThe IBM Netezza datawarehouse appliance
The IBM Netezza datawarehouse appliance
 
Cisco entel summit2010
Cisco entel summit2010Cisco entel summit2010
Cisco entel summit2010
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Sql azure data services OData
Sql azure data services ODataSql azure data services OData
Sql azure data services OData
 

Plus de www.panorama.com

Top 10 bi trends for 2014 deck
Top 10 bi trends for 2014 deckTop 10 bi trends for 2014 deck
Top 10 bi trends for 2014 deckwww.panorama.com
 
Business Intelligence Meets Big Data Variety
Business Intelligence Meets Big Data VarietyBusiness Intelligence Meets Big Data Variety
Business Intelligence Meets Big Data Varietywww.panorama.com
 
Bulding a social enterprise
Bulding a social enterpriseBulding a social enterprise
Bulding a social enterprisewww.panorama.com
 
Enhance your microsoft bi stack to drive business user adoption slide share
Enhance your microsoft bi stack to drive business user adoption   slide shareEnhance your microsoft bi stack to drive business user adoption   slide share
Enhance your microsoft bi stack to drive business user adoption slide sharewww.panorama.com
 
Panorama BI for Retail (WPC12)
Panorama BI for Retail (WPC12)Panorama BI for Retail (WPC12)
Panorama BI for Retail (WPC12)www.panorama.com
 
10 necto administration_ready
10 necto administration_ready10 necto administration_ready
10 necto administration_readywww.panorama.com
 
08 necto working_with_kpi_ready
08 necto working_with_kpi_ready08 necto working_with_kpi_ready
08 necto working_with_kpi_readywww.panorama.com
 
07 necto data_sources_ready
07 necto data_sources_ready07 necto data_sources_ready
07 necto data_sources_readywww.panorama.com
 
06 necto advanced_analytics_ready
06 necto advanced_analytics_ready06 necto advanced_analytics_ready
06 necto advanced_analytics_readywww.panorama.com
 
05 building a_necto_social_network_ready
05 building a_necto_social_network_ready05 building a_necto_social_network_ready
05 building a_necto_social_network_readywww.panorama.com
 
03 creating new_work_boards_ready
03 creating new_work_boards_ready03 creating new_work_boards_ready
03 creating new_work_boards_readywww.panorama.com
 
02 the necto_application_ready
02 the necto_application_ready02 the necto_application_ready
02 the necto_application_readywww.panorama.com
 
BI-to-go: Tablets to Boost Business User Adoption
BI-to-go: Tablets to Boost Business User AdoptionBI-to-go: Tablets to Boost Business User Adoption
BI-to-go: Tablets to Boost Business User Adoptionwww.panorama.com
 
Business Intelligence 3.0 Revolution
Business Intelligence 3.0 RevolutionBusiness Intelligence 3.0 Revolution
Business Intelligence 3.0 Revolutionwww.panorama.com
 
Contextual Discovery in Business Intelligence
Contextual Discovery in Business IntelligenceContextual Discovery in Business Intelligence
Contextual Discovery in Business Intelligencewww.panorama.com
 
From Collaboration To Social Intelligence
From Collaboration To Social IntelligenceFrom Collaboration To Social Intelligence
From Collaboration To Social Intelligencewww.panorama.com
 
Complete BI Solution for your Microsoft Platform
Complete BI Solution for your Microsoft PlatformComplete BI Solution for your Microsoft Platform
Complete BI Solution for your Microsoft Platformwww.panorama.com
 
Use BI to Beat the Competition
Use BI to Beat the CompetitionUse BI to Beat the Competition
Use BI to Beat the Competitionwww.panorama.com
 
Leverage BI to Manage Operational Risk
Leverage BI to Manage Operational RiskLeverage BI to Manage Operational Risk
Leverage BI to Manage Operational Riskwww.panorama.com
 

Plus de www.panorama.com (20)

Top 10 bi trends for 2014 deck
Top 10 bi trends for 2014 deckTop 10 bi trends for 2014 deck
Top 10 bi trends for 2014 deck
 
Business Intelligence Meets Big Data Variety
Business Intelligence Meets Big Data VarietyBusiness Intelligence Meets Big Data Variety
Business Intelligence Meets Big Data Variety
 
Bulding a social enterprise
Bulding a social enterpriseBulding a social enterprise
Bulding a social enterprise
 
Enhance your microsoft bi stack to drive business user adoption slide share
Enhance your microsoft bi stack to drive business user adoption   slide shareEnhance your microsoft bi stack to drive business user adoption   slide share
Enhance your microsoft bi stack to drive business user adoption slide share
 
Panorama BI for Retail (WPC12)
Panorama BI for Retail (WPC12)Panorama BI for Retail (WPC12)
Panorama BI for Retail (WPC12)
 
10 necto administration_ready
10 necto administration_ready10 necto administration_ready
10 necto administration_ready
 
08 necto working_with_kpi_ready
08 necto working_with_kpi_ready08 necto working_with_kpi_ready
08 necto working_with_kpi_ready
 
07 necto data_sources_ready
07 necto data_sources_ready07 necto data_sources_ready
07 necto data_sources_ready
 
06 necto advanced_analytics_ready
06 necto advanced_analytics_ready06 necto advanced_analytics_ready
06 necto advanced_analytics_ready
 
05 building a_necto_social_network_ready
05 building a_necto_social_network_ready05 building a_necto_social_network_ready
05 building a_necto_social_network_ready
 
03 creating new_work_boards_ready
03 creating new_work_boards_ready03 creating new_work_boards_ready
03 creating new_work_boards_ready
 
02 the necto_application_ready
02 the necto_application_ready02 the necto_application_ready
02 the necto_application_ready
 
BI-to-go: Tablets to Boost Business User Adoption
BI-to-go: Tablets to Boost Business User AdoptionBI-to-go: Tablets to Boost Business User Adoption
BI-to-go: Tablets to Boost Business User Adoption
 
Business Intelligence 3.0 Revolution
Business Intelligence 3.0 RevolutionBusiness Intelligence 3.0 Revolution
Business Intelligence 3.0 Revolution
 
Contextual Discovery in Business Intelligence
Contextual Discovery in Business IntelligenceContextual Discovery in Business Intelligence
Contextual Discovery in Business Intelligence
 
Social intelligence
Social intelligenceSocial intelligence
Social intelligence
 
From Collaboration To Social Intelligence
From Collaboration To Social IntelligenceFrom Collaboration To Social Intelligence
From Collaboration To Social Intelligence
 
Complete BI Solution for your Microsoft Platform
Complete BI Solution for your Microsoft PlatformComplete BI Solution for your Microsoft Platform
Complete BI Solution for your Microsoft Platform
 
Use BI to Beat the Competition
Use BI to Beat the CompetitionUse BI to Beat the Competition
Use BI to Beat the Competition
 
Leverage BI to Manage Operational Risk
Leverage BI to Manage Operational RiskLeverage BI to Manage Operational Risk
Leverage BI to Manage Operational Risk
 

Dernier

Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 

Dernier (20)

Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 

09 necto architecture_ready

  • 1. Necto Training Module 9: Necto Architecture and Security
  • 2. Agenda Necto Architecture Necto Security
  • 4. Prerequisites Necto Software IIS Analysis Client Server Data Necto Server Customer Data Warehouse Windows 2008 Necto Server
  • 5. BI Services BI Display BI Calculations Necto Software NovaView.aspx BI Server IIS Analysis Client Server Data Necto Server Customer Data Warehouse Windows 2008 Necto Server
  • 6. Administrative Services Administration of: • Workboard trees • Social • Users and roles Necto Software • Etc. NovaView.aspx BI Server IIS Admin Web Admin Analysis Services Server Server Client Social Data Necto Server Customer Data Warehouse Windows 2008 Necto Server
  • 7. Necto Server Data Calculation and Storage Can use SQL express installed or with Necto SQL Express Necto DB SQL Server Necto Software NovaView.aspx BI Necto Calculations Server Server/s IIS Recommended: Admin web Admin separate SQL services Server Client servers Social Necto Server Both BI and Admin servers use this work area Windows 2008 Necto Server
  • 8. Universal Data Connector (UDC) Provides connection to additional data sources Necto Software NovaView.aspx BI Server IIS Admin Web Admin Analysis Services Server Server Client Social Data Necto Server UDC Customer data Warehouse LB Performs load balancing Analysis of UDC requests Windows 2008 Services instance Data Necto Server SQL Sources Creates and updates cubes UDC
  • 9. Necto Architecture Summary SQL Express Necto DB SQL Server Necto Software NovaView.aspx BI Necto Calculations Server Server/s IIS Admin Web Admin Analysis Services Server Server Client Social Data Necto Server UDC Customer Data Warehouse LB Analysis Windows 2008 Services instance Data Necto Server SQL Sources UDC
  • 11. Security Overview Content Data (OLAP ) Security Security • Can be Roles implemented by user name or by the role the user belongs to Users • Which • Which portions of the workboards will data will be available be available • Defined in terms of Dimensions and Members
  • 12. Content Data (OLAP ) Security Security Roles Users OLAP Security
  • 13. Data (OLAP) Security Users are added to roles in a SSAS cube OLAP Domain Users Roles specify which objects and members will be available Roles to users Users must be part of an Active Groups Directory domain and imported into Necto Dashboard User User User
  • 14. Users and Roles OLAP Domain Necto Roles can be added manually Users Roles Import Roles Groups Groups User User User Domain Server Necto When an active directory Users Users Users user logs into Necto – a user is created in Necto From Necto Manually Server defined
  • 15. Data (OLAP) Security Necto Users are added to roles in a SSAS cube Roles Roles specify which objects and members will be available to users Groups Users must be part of an Active Directory domain and imported into NovaView Dashboard Necto and Server users can be mapped to domain users Domain Server Necto Users Users Users For example: a guest user
  • 16. Role vs. User Based Security Content Data (OLAP ) Security Security Both security Roles methods can be implemented per role or per user. What should I use? Users
  • 17. Role vs. User Based Security Connection to data source is defined by: Server, database, cube, security (Role or User) Role-based security enables reuse of connection Better efficiency of Necto and AS Necto Analysis Server Server
  • 18. Content Data (OLAP ) Security Security Roles Users Content Security
  • 19. Content Security Public Workboards Access rights (permissions) are assigned by administrator per role Private folders Per user User can share with users or roles Shared folders of other users Best Practice: • Public folders – view-only for most users • Users should create new workboards in their private folder
  • 20. Content Permissions Levels Name Weight Description All administrative rights, including giving rights to Admin 5 others The user will see that the workboard exists Deny 4 but will not be able to view it User will be allowed to change and edit the Write 3 workboard Read 2 View only The user will not see that the Workboard exists Hidden 1 Therefore will not be able to access it No permission has been assigned. Permissions None 0 will be inherited from parent folder
  • 21. User James Part of Role A Role A = Permission Admin Permission = Inherit Admin Admin 5 Deny 4 Write 3 Read 2 Hidden 1 None 0
  • 22. Breaking Inheritance If Same Role Take Last, Unless Admin Role A = Permission Admin Role A = Permission Same Role, Take Last, Hidden Unless Admin Permission – Inherit Admin Role A = Permission Read Role A = Permission Same Role, Take Last Hidden Permission – Inherit Hidden Admin 5 Role A = Permission Read Deny 4 Role A = Permission Same Role, Write 3 Deny Take Last Read 2 Permission – Inherit Deny Hidden 1 None 0
  • 23. Combining Hierarchies – User James is Member of Role A & B Role A = Permission Admin Role B = Permission MAX(Admin, Hidden Permission – Inherit Hidden) Admin Role A = Permission Read Role B = Permission MAX(Read, Hidden) Hidden Permission – Inherit Read Admin 5 Role A = Permission Read Deny 4 Role B = Permission MAX(Read, Write 3 Deny Permission – Inherit Deny) Read 2 Deny Hidden 1 None 0
  • 24. Breaking & Combining Hierarchies First Break Then Combine Role A = Permission Hidden Role A = Permission Role B = Permission Role C = Permission Read Admin Read Role A = Permission Role B = Permission Role C = Permission Hidden Admin Hidden Role A = Permission Role B = Permission Deny Read Role A = Permission Role B = Permission Admin Hidden Role A = Permission Role B = Permission Read Deny Admin 5 Role A = Permission Hidden Deny 4 Role A = Permission Role B = Permission Write 3 Deny Read Read 2 Hidden 1 None 0
  • 25. Remove Remove any role that James is not a part of
  • 26. Removing Role C “James is a Member of Role A & B” Role A = Permission Hidden Role A = Permission Role B = Permission Role C = Permission Read Admin Read Role A = Permission Role B = Permission Role C = Permission Hidden Admin Hidden Role A = Permission Role B = Permission Deny Read Role A = Permission Role B = Permission Admin Hidden Role A = Permission Role B = Permission Read Deny Admin 5 Role A = Permission Hidden Deny 4 Role A = Permission Role B = Permission Write 3 Deny Read Read 2 Hidden 1 None 0
  • 27. Break Hierarchy In each role use Thumb Rule 1: Break Hierarchy “Use last folder permission unless Root = Admin”
  • 28. Breaking Hierarchies “Use last folder permission unless Root = Admin” Role A = Permission Hidden Role A = Permission Role B = Permission Read Admin Role A = Permission Role B = Permission Hidden Admin Role A = Permission Role B = Permission Deny Read Role A = Permission Role B = Permission Admin Hidden Role A = Permission Role B = Permission Read Deny Admin 5 Role A = Permission Hidden Deny 4 Role A = Permission Role B = Permission Write 3 Deny Read Read 2 Role A = Permission Role B = Permission Hidden 1 Deny Admin None 0
  • 29. Combine The highest permission is selected
  • 30. Combining Hierarchies ”The highest permission is selected” Role A = Permission Hidden Role A = Permission Role B = Permission Read Admin Role A = Permission Role B = Permission Hidden Admin Role A = Permission Role B = Permission Deny Read Role A = Permission Role B = Permission Admin Hidden Role A = Permission Role B = Permission Read Deny Admin 5 Role A = Permission Hidden Deny 4 Role A = Permission Role B = Permission Write 3 Deny Read Read 2 Role A = Permission Role B = Permission Hidden 1 Deny Admin None 0
  • 31. Breaking & Combining Hierarchies First Break, Then Combine Role A = Permission Hidden Role A = Permission Role B = Permission Read Admin Role A = Permission Role B = Permission Hidden Admin Role A = Permission Role B = Permission Deny Read Role A = Permission Role B = Permission Admin Hidden Role A = Permission Role B = Permission Read Deny Admin 5 Role A = Permission Hidden Deny 4 Role A = Permission Role B = Permission Write 3 Deny Read Read 2 Permission – Inherit Admin Hidden 1 None 0
  • 32. Summary In this lesson you have learned about: Necto Architecture Necto Security