- Instant SQL Server Analysis Services 2012 Cube Security
- Satya SK Jayanty
- 191字
- 2021-08-13 16:32:03
Designing and creating security roles in an OLAP database (Intermediate)
Designing and creating are the initial steps to define the security roles, irrespective of the type of database, whether it is a relational-database or analytical-database.
Note
A primary reflection of security roles in a database highlights the behavioral changes of users and schemas separation since SQL Server 2005 version.
In a relational world, schemas are no longer equivalent to database users (they are simply a container of objects) and each schema has a distinct namespace that exists independently of the database user who created it. Such separation enables the administrators to grant necessary privileges on schemas to the corresponding database users.
Similarly, security roles also play very important role in the SSAS world. To manage security for Analysis Services objects and data, a role can be associated to the Security Identifiers (let us refer to them as SIDs) of Windows operating system users and groups that have specific access rights and permissions defined for the objects managed by SSAS instance.
Let us see how to construct security management and fulfill security roles criteria from the first recipe in this instant cookbook.