MicroStrategy ONE
How to Set User Privileges for Shared Data Sources
MicroStrategy Workstation allows you to share database connections among users or groups of users. You can set the privileges for each user or group that needs to access the data source when you define the database connection. To grant or restrict access to a data source, follow the steps below.
You must have the necessary privileges in MicroStrategy. For details, contact your administrator.
You are familiar with the process of creating a database connection. For detailed instructions, see Create a Database Connection.
To Set Access Controls for Data Sources
- Create a blank dossier or open an existing one.
-
Choose Add Data > New Data to import data into a new dataset.
or
In the Datasets panel, click More next to the dataset name and choose Edit Dataset to add data to the dataset. The Preview Dialog opens. Click Add a new table.
The Data Sources dialog opens.
- Select Select Tables and click Next. The Import from Tables dialog opens. If you selected a specific database, only the data source connections that correspond to the selected database appear. If you did not select a database, all available data source connections appear.
- Hover over the data source you want to view or edit user and user group permissions for and choose Share.
-
In the left pane, click Security Access.
-
Use the Search to add users or user groups box to locate users and user groups for which you want to change access.
-
Select the level of permissions for each user or user group from the corresponding drop-down.
or
Select the user or user group for which you want to set custom permissions. Select the options at the bottom of the dialog to allow or deny permissions.
- - Allow
- - Deny
- - Default
or
Remove the user or user group from the list by clicking the X to the right of the user or user group.
- If necessary, click Advanced Security Access to modify permissions for multiple users and user groups at the same time.
- Click OK.
For detailed information about the specific permissions available for each permission level and an explanation of each permission, including an introduction and examples of ACLs, see the System Administration Help.
Related Topics
Import Data from a Database, Hadoop, or Google Big Query by Selecting Tables