O'Reilly logo

Microsoft Tabular Modeling Cookbook by Paul te Braak

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing data with roles

Often, there is a desire to restrict the amount of data that a user can see. This can take two forms. Firstly, there may be a need to restrict data because of a security concern, that is, the user should only be able to read information from the model that relates to their area of operating concern. Typical examples of this type of security restrictions are based on geographical areas, reporting, or departmental lines. Restricting data through security is examined in this recipe and the Implementing dynamic security recipe in this chapter. Secondly, we may wish to restrict the objects that a user can see when they connect to the server. This is not the application of a security feature, but simply the creation of specific ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required