Security and Authentication

Analysis Services

Analysis Services

Security and Authentication

You can restrict access to data managed by Microsoft® SQL Server™ 2000 Analysis Services. You can limit the administrators that are permitted to access Analysis Services data through Analysis Manager and perform administrative functions. You can also restrict end users who access data on the Analysis server through client applications. You can specify which end users can access data and the types of operations they can perform. In addition, you can control end-user access at various levels of Analysis Services data, including the cube, dimension, and cube cell.

Administrator security is controlled using the Microsoft Windows NT® 4.0 or Windows® 2000 group named OLAP Administrators.

End-user security is controlled using:

  • Authentication during connection to the Analysis server.

  • Database, cube, and mining model roles defined in Analysis Manager.

Each role defines a set of users and the access they all share. A role is defined at the Analysis Services database level and then assigned to cubes that the users in the role are permitted to access. After assignment some changes are permitted to the role at the cube level. These changes do not affect the role at the database level. (An exception is a change to the users and groups in the cube role.) Thus, a role can have a different definition for each cube to which it is assigned.

Analysis Services supports Windows integrated security system.

The following topics describe security in more detail.

Topic Description
Administrator Security Provides information on administrative security roles
End-User Security Identifies issues related to implementing end-user security
User Accounts and Groups Provides information about establishing user accounts necessary for Analysis Manager roles
Database, Cube, and Mining Model Roles Describes the three types of security roles used in Analysis Services
Levels of End-User Security Identifies the Analysis Services objects that security roles can be applied to
Server Security and Authentication Provides information about how server security is applied in Analysis Services using authentication
Database Security Describes how database security roles are used in relation to database security
Cube Security Describes how cube security roles are used in relation to cube security
Dimension Security Describes how dimension security specifications are used in relation to cube security
Cell Security Describes how cell security specifications are used in relation to cube security
Operational Considerations Provides information about Analysis server procedures that should be followed to ensure system security
Mining Model Security Provides information about how mining model roles are used for mining model security