Strategy ONE

Authentication

Most standard Strategy platform authentication features also apply to MDX cube sources and MDX cube reports, using one of the following supported methods:

  • NT (Windows) authentication: Uses your network login ID to authenticate a connection to Strategy Intelligence Server. NT (Windows) authentication can be used to authenticate the user to the Intelligence Server, but not to MDX cube sources.
  • Standard authentication and LDAP authentication: Are supported independently from the data source that is being used. Standard authentication and LDAP authentication can be used to authenticate the user to the Intelligence Server, but not to MDX cube sources.
  • Connection mapping: Is supported the same way as for standard Strategy reports. In addition, specific connection mappings may be designated for each database instance and user or group combination.
  • Database authentication: Is supported in the same way as for relational data providers. If multiple sources are configured for database authentication, the same login information must be applicable to all sources.
  • If your project connects to SAP BW as an MDX cube source, you can enable users to log in to a Strategy project with their SAP user credentials and use SAP BW roles as a method to grant the users privileges in Strategy. This SAP user creation and security in Strategy requires that you use the Strategy database authentication option. For information on importing SAP users and roles into MicroStrategy Strategy, see Authenticating SAP BW Users in Strategy Projects.
  • Integrated authentication: Is supported for single sign-on authentication to Microsoft Analysis Services and SAP BW MDX cube sources. For information about the single sign-on functionalities supported for MDX cube sources and necessary configuration steps, see Single Sign-On to Microsoft Analysis Services and Single Sign-On to SAP BW

In addition to these methods for authentication within the Strategy platform, the following topics explain the authentication and permissions required for other systems: