Server Security and Authentication
End-user security at the Analysis server level is controlled by authentication. To successfully connect to an Analysis server, an end user must be successfully authenticated on that Analysis server. Only after successful authentication are the roles on the Analysis server evaluated to determine the types and scope of access the end user has to objects on the Analysis server.
Authentication can be accomplished by various methods. The available methods depend in part on the way the end user attempts to connect to the Analysis server. If the end user tries to connect directly to the Analysis server, one set of authentication methods is available. If the end user tries to connect to the Analysis server through Internet Information Services (IIS), another set of authentication methods is available. For more information, see Authentication of Direct Connections and Authentication of Connections.