Version 2020
Step 3: Establishing Security Privileges 
Step 1: Optimizing HyperIntelligence Datasets
Step 3: Establishing Security Privileges (You are here)
Great work on creating cards! Now it's time to pass things off to the Administrator. As the Admin, it is your job to ensure users can view cards in their web browser. To do this, you first need to certify the card and then provide security access to the employees at your company.
How to Certify a Card
- In the Navigation pane of the Workstation window, click Cards.
- Right-click the card Employee Dataset Cards and choose Certify. An orange ribbon
appears on the card indicating it is certified.
Now your card is viewed as having reputable data and can be shared with others. The final step is to provide specific users with the ability to view cards by giving them security access.
How to Provide Security Access
- Right-click the card Employee Dataset Cards and choose Properties.
- In the left navigation bar, click Security Access.
Notice you are the only user who can view the card and, by default, you have full control permissions over the card.
- Use the search to add a user or user group.
- In the drop-down that corresponds with the new user or user group, choose View.
View permissions allow users to browse, read, use, and execute cards. However, they cannot write, delete, or control cards.
What are the other types of permissions?Deny: The card does not appear in the extension. If the user previously had access to the card, a warning sign appears to them after the browser refreshes.
View: The card appears in the extension and users can browse, read, and use cards.
Modify: The card appears in the extension and users can browse, read, use, write, and delete cards.
Default: Based on the settings for the parent folder.
Full Control: The card appears in the extension and the user can browse, read, use, execute, write, delete, and control the cards. Card authors have this permission by default.
Custom: Based on the custom settings at the bottom of the dialog. To view and use the card, select Browse, Read, and Execute.
-
Click OK.
Now that you've provided users with security access, ensure your environment has CORS settings enabled.
How to Enable CORS Settings
Cross-Origin Resource Sharing (CORS) is a mechanism that uses additional HTTP headers to tell a browser to allow a web application running at one domain to have permission to access selected resources from a server at a different origin. This setting must be enabled in your environment for HyperIntelligence for Web to work.
- From the Welcome to MicroStrategy on AWS email, click Access MicroStrategy Platform.
- Under More Resources, hover over MicroStrategy Library and click Configure.
- On the Library Admin page, select Library Server from the left menu.
- Under Security Settings, select All.
- Click Save.
- Navigate to your MicroStrategy Cloud Console and restart the Library server.
Awesome! Now that users have the ability to see the cards in their browsers, the Administrator can pass the reigns to the Business User!