Security - Managing Your Users and Their Access

So far in MicroStrategy, we have covered a good amount of Schema and Public or Application Objects. It is time now to switch gears and explore objects that will allow administrators to deploy a security layer in MicroStrategy by controlling user privileges and user access to Projects and to specific objects. These objects are part of the MicroStrategy Configuration Objects.

The following topics will be covered:

  • MicroStrategy Configuration Objects
  • MicroStrategy Users and User Groups and how to create them
  • MicroStrategy privileges
  • What a MicroStrategy Security Role is and how to create one and assign it
  • What a MicroStrategy Security Filter is and how to create one and assign it
  • MicroStrategy ...

Get MicroStrategy Quick Start Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.