MicroStrategy ONE

How to Create a User

A user is an account in MicroStrategy, which represents a person who uses the MicroStrategy features. For example, a user may be someone who creates and owns objects, or someone who opens and analyzes the data in reports and documents within MicroStrategy. The MicroStrategy security model is built around the concept of a user.

To work with MicroStrategy, users must have a user account created for them, which defines what access privileges they have, their login ID and password to log into the system, and so on. Users are defined in the MicroStrategy metadata and exist across projects. You do not have to define users for every project you create in a single metadata repository.

For additional information on users within the MicroStrategy system, see the System Administration Help.

  1. Access the Intelligence Server Administrator page. (How?)

  2. Hover over the Properties column and click Open Intelligence Server Administration Portal .

  3. Click User Manager . A list of user groups that reside on the Intelligence Server appears.
  4. Select the group in which to create a user. For example, if you want to create a new user in the Web Reporter group, click the Web Reporter group link. A list of the users that belong to the selected group is displayed.

  5. Click the New User icon on the toolbar. The User Editor opens.

  6. On the General tab, type the following information:

    • Login and full name of the new user, and a description

      The login ID is limited to 50 characters.

    • Specify a password.

    • Specify whether a user can change the password themselves, or must change the password at their next logon.

    • Set the password expiration criteria. For information on password expiration, see How to Configure Password Expiration Criteria.

    • Make sure the Account Disabled checkbox is cleared.

      To advance to the next tab in the editor, you must type at least a login name and full name.

  7. On the Project Access tab, assign the security roles and privileges you wish the user to have.

    • The colored check marks and Xs indicate what the privileges are and where they are obtained from. For a list of privileges assigned to security roles, default privileges assigned to each group, and a definition of all privileges in MicroStrategy, see theSystem Administration Help.

    • Use the Security Role Selection drop-down list below each project to assign inherited privileges to the user, based on predefined security roles. For background information on security roles, see About Managing Project Access Using Security Roles.

    • To apply multiple security roles to a user, select the Custom security role, and then select the security roles using the Project Access dialog box.

    • If + Inherited Access appears, the user has access according to the security role assigned to the project.

    • Several MicroStrategy products require separate licenses for those privilege to be available (for example, Web Professional privileges, OLAP Services privileges, Report Services privileges, and so on.) See the System Administration Help for details on licensing and product options.

      The user privileges you grant may be broadened or extended depending on the group(s) to which the user is assigned.

  8. On the Security Filters tab, assign any security filters to the user which you want to restrict the data this user can see displayed in reports. For details on security filters, see How to Assign Security Filters to Users and Groups

  9. On the Groups tab, select the group(s) to which you want to assign this user. The user inherits privileges from the group, and inherits any security filter restrictions from security filters assigned to the group to which they belong. For details, see How to Assign Security Filters to Users and Groups.

  10. On the Authentication tab, enter the user's Login ID or user name or group to which they are linked for authentication. For complete details on authentication options, see the System Administration Help. Depending on the authentication mode of the project, you should specify:

    • The Windows login of the user, if using Windows authentication.

    • The Database login and Database password of the user, if using database authentication.

      For security reasons, if you use database authentication, you should enable the "Create caches per database login, setting" using the Project Configuration Editor in MicroStrategy Developer. Enabling this setting ensures that users who execute their reports using different database login IDs cannot use the same cache, and therefore cannot see each other's cached reports.

    • The LDAP login/distinguished name of the LDAP user, if using LDAP authentication.

    • To ensure that the user cannot use standard authentication to log in, select the User cannot use standard authentication checkbox. This checkbox is available only if a Windows login is specified above.

  11. On the Addresses tab, add email, file, or printer addresses for the user if the user will be subscribing to report and document delivery, or others will be subscribing this user to deliveries. Adding an address to the user provides a location to deliver reports and documents to for this user. For details on user addresses, see How to Create and Manage Addresses for a User.

  12. On the Contacts tab, add existing contacts and contact groups to the user if the user will be subscribing to report and document delivery, or others will be subscribing this user to deliveries. Adding contacts and contact groups to the user provides a number of conveniences for the user when subscribing to report and document delivery. Contacts can also be used when scheduling report or document deliveries for people outside the MicroStrategy system. For details on contacts, see How to Add and Remove Contacts for a User.

  13. Click OK.