MicroStrategy ONE

Maintaining data access security using Intelligent Cubes

Reports that connect to Intelligent Cubes adhere to many of the same standards of data access security as the rest of your MicroStrategy project. You can control users' access to data with security filters. For more information on security filters, see Restricting Access to Data: Security Filters in the System Administration Help.

User and group security filters are applied automatically on the reports that connect to an Intelligent Cube, as illustrated below:

Intelligent Cube containing East & West; Security Filter 1 filters out West; Security Filter 2 filters out East

This approach allows a single Intelligent Cube to be used by multiple security filters, rather than having to create separate Intelligent Cubes for each security filter. By using a single Intelligent Cube to support all the security filters for a project, data access security is implemented automatically with minimal burden on Intelligence Server memory.

However, there are some differences in security filter resolution for reports that connect to Intelligent Cubes as compared to reports that directly access the data warehouse. For information on these differences, see the In-memory Analytics Help.

Data access security with connection mapping

In MicroStrategy, you can also use connection mapping to control the data that users have access to when they run reports. You can also apply this security when users create reports that connect to an Intelligent Cube. For information on maintaining data access security with connection mapping to Intelligent Cubes, see the System Administration Help.