{"id":3783,"date":"2021-01-29T11:00:30","date_gmt":"2021-01-29T10:00:30","guid":{"rendered":"https:\/\/bestdatasolutions.es\/microstrategy-security\/"},"modified":"2021-07-09T15:22:56","modified_gmt":"2021-07-09T14:22:56","slug":"microstrategy-security","status":"publish","type":"post","link":"https:\/\/bestdatasolutions.es\/en\/blog\/microstrategy-security\/","title":{"rendered":"MicroStrategy Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3783\" class=\"elementor elementor-3783 elementor-2550\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-187471cb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"187471cb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8a0c01d\" data-id=\"8a0c01d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fbff00b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"1fbff00b\" data-element_type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"500\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/MicroStrategy-Security.jpg\" class=\"attachment-full size-full wp-image-2441\" alt=\"MicroStrategy Security\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/MicroStrategy-Security.jpg 1920w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/MicroStrategy-Security-300x78.jpg 300w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/MicroStrategy-Security-1024x267.jpg 1024w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/MicroStrategy-Security-768x200.jpg 768w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/MicroStrategy-Security-1536x400.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d1c2c13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d1c2c13\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5aae2e0d\" data-id=\"5aae2e0d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a3ffa42 elementor-author-box--layout-image-left elementor-author-box--align-left elementor-author-box--image-valign-middle elementor-author-box--avatar-yes elementor-author-box--name-yes elementor-author-box--biography-yes elementor-widget elementor-widget-author-box\" data-id=\"1a3ffa42\" data-element_type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/es.linkedin.com\/in\/joacoatt\" target=\"_blank\" class=\"elementor-author-box__avatar\" rel=\"noopener\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/joaquin-attanasio-1.jpg\" alt=\"Picture of Joaquin Attanasio\" loading=\"lazy\" title=\"\">\n\t\t\t\t<\/a>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/es.linkedin.com\/in\/joacoatt\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tJoaquin Attanasio\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\tBusiness Intelligence Consultant | Microstrategy Expert | Data Specialist\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41a959e0 elementor-widget elementor-widget-heading\" data-id=\"41a959e0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-large\">Other Articles:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6c75b22c\" data-id=\"6c75b22c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5795bde9 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"5795bde9\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xl\">MicroStrategy Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-561b31d1 elementor-widget elementor-widget-post-info\" data-id=\"561b31d1\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-869d2fb elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/bestdatasolutions.es\/en\/2021\/01\/29\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-calendar\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M12 192h424c6.6 0 12 5.4 12 12v260c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V204c0-6.6 5.4-12 12-12zm436-44v-36c0-26.5-21.5-48-48-48h-48V12c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v52H160V12c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v52H48C21.5 64 0 85.5 0 112v36c0 6.6 5.4 12 12 12h424c6.6 0 12-5.4 12-12z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>29\/01\/2021<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51a1529 elementor-share-buttons--view-icon-text elementor-share-buttons--skin-gradient elementor-share-buttons--shape-square elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"51a1529\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tLinkedIn\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-facebook\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tFacebook\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tTwitter\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Share on whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-whatsapp\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tWhatsApp\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56263e9 elementor-widget elementor-widget-text-editor\" data-id=\"56263e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Hello, hello! How are you, friends? How is it going? Welcome everyone back to a new episode of <i><b>#BestInMicro<\/b><\/i>! Today we&#8217;re going to get into a topic that really makes MicroStrategy stand out from the rest of the tools. Today we will talk about <b>security layers in MicroStrategy.<\/b> <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0bf3df elementor-widget elementor-widget-image\" data-id=\"f0bf3df\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"703\" height=\"397\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/microstrategy.jpg\" class=\"attachment-full size-full wp-image-2595\" alt=\"MicroStrategy\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/microstrategy.jpg 703w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/microstrategy-300x169.jpg 300w\" sizes=\"(max-width: 703px) 100vw, 703px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11790b2 elementor-widget elementor-widget-text-editor\" data-id=\"11790b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As we already know, unlike other visualization tools, MicroStrategy has a much more complex architecture. To begin with, the great advantage it has over the rest of the tools is its semantic layer, which gives us a range of facilities in terms of security, since it allows us to manage a highly complex structure and to manage in great detail the accesses to the information we have.<\/p>\n<p>As always, we start from the beginning&#8230;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a78e20 elementor-widget elementor-widget-heading\" data-id=\"7a78e20\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">The importance of data security.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4028de2 elementor-widget elementor-widget-text-editor\" data-id=\"4028de2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>There is a well-known saying that goes <i>&#8220;information is power&#8221;<\/i>. And this is precisely why it is so important to know, understand and control who is looking at what data. When. How it processes them. As a company, it is important to understand that data should be accessed only by those who have the access to do so.<\/p>\n<p><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">Today we will review the 6 layers of security that MicroStrategy has. They are :<\/span><\/p>\n<ul>\n<li> Security at user authentication level (Authentication type)<\/li>\n<li> Security at database level (Connection mapping)<\/li>\n<li> Access Control List (ACL)<\/li>\n<li> Security filters <\/li>\n<li> User privileges <\/li>\n<li> Security roles<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-021a8c3 elementor-widget elementor-widget-image\" data-id=\"021a8c3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"294\" height=\"179\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/microstrategy-security-1.jpg\" class=\"attachment-full size-full wp-image-2589\" alt=\"Security Image\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69191ee elementor-widget elementor-widget-text-editor\" data-id=\"69191ee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Let&#8217;s not forget that all these security layers can be assigned at both user and user group levels, and maximum restriction is always a priority. For example, if a user belongs to a group that gives access to a report, and also belongs to another group that has blocked access, the user will not be able to access the report.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddcf993 elementor-widget elementor-widget-heading\" data-id=\"ddcf993\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Security at user authentication level (Authentication type)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1edf6e5 elementor-widget elementor-widget-text-editor\" data-id=\"1edf6e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This is the first safety barrier, logically. When we want to connect to MicroStrategy, the first thing we are asked for is a username and password to connect. Basic, right? This is common to virtually all tools. What I am interested in emphasizing here is that these credentials may be defined in different origins. That is, we have MicroStrategy&#8217;s generic authentication, which stores (in encrypted form, of course) the credentials in its Metadata. But there are also other types of authentication, where the credentials are validated against the database, against an LDAP server, a Kerberos or other external servers, with Windows credentials, etc&#8230;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e657e3a elementor-widget elementor-widget-image\" data-id=\"e657e3a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"769\" height=\"464\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-authentication.jpg\" class=\"attachment-full size-full wp-image-2586\" alt=\"Security Autentication\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-authentication.jpg 769w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-authentication-300x181.jpg 300w\" sizes=\"(max-width: 769px) 100vw, 769px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e717ddf elementor-widget elementor-widget-heading\" data-id=\"e717ddf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Security at database level (Connection mapping)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b5b938 elementor-widget elementor-widget-text-editor\" data-id=\"7b5b938\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As we all know, to connect from MicroStrategy to a database we use a <i>database instance,<\/i> which tells us:<\/p>\n<ul>\n<li><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">To which database we will connect<\/span><\/li>\n<li><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">With which DSN we will connect<\/span><\/li>\n<li>With which credentials we will connect.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc265b6 elementor-widget elementor-widget-image\" data-id=\"bc265b6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"237\" height=\"331\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-data-base.jpg\" class=\"attachment-full size-full wp-image-2577\" alt=\"Security Data Base\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-data-base.jpg 237w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-data-base-215x300.jpg 215w\" sizes=\"(max-width: 237px) 100vw, 237px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-395c605 elementor-widget elementor-widget-text-editor\" data-id=\"395c605\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The <i>connection mapping<\/i> gives us the possibility to configure the DSN and credentials that are used when connecting to the database, depending on the user or group that wants to make the query.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdd716f elementor-widget elementor-widget-image\" data-id=\"fdd716f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"344\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-connection-mapping.jpg\" class=\"attachment-full size-full wp-image-2580\" alt=\"Security Connection Mapping\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-connection-mapping.jpg 800w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-connection-mapping-300x129.jpg 300w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-connection-mapping-768x330.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be5d71d elementor-widget elementor-widget-text-editor\" data-id=\"be5d71d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This not only allows us to manage access and permissions from the database, but also allows us to connect to different databases in the same project for the same objects. For example, if we have a report that shows sales at country level, and each country has its own database, we can use the &#8220;Europe&#8221; group to connect to the European database, while the &#8220;US&#8221; group will connect to the US database.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97e2210 elementor-widget elementor-widget-image\" data-id=\"97e2210\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"522\" height=\"365\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-connection.jpg\" class=\"attachment-full size-full wp-image-2583\" alt=\"Security Connection\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-connection.jpg 522w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-connection-300x210.jpg 300w\" sizes=\"(max-width: 522px) 100vw, 522px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-093bd25 elementor-widget elementor-widget-heading\" data-id=\"093bd25\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Access Control List (ACL)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d671c3b elementor-widget elementor-widget-text-editor\" data-id=\"d671c3b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Well, there is not much to comment on this type of security. The famous ACL that exists in any directory, where you specify which permissions (read, execute or write, among others) you have over an object, besides being able to define the permissions over its children (in case of being a folder, logically). <\/p>\n<p>Remember that whenever you want to do an audit I explained in the <em><a href=\"https:\/\/bestdatasolutions.es\/blog\/microstrategy-metadata-queries\/\">Metadata Queries article<\/a><\/em> a query to make an extraction of all the objects with their ACLs.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23d1f1f elementor-widget elementor-widget-image\" data-id=\"23d1f1f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"412\" height=\"668\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/acl-security.jpg\" class=\"attachment-full size-full wp-image-2604\" alt=\"ACL Security\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/acl-security.jpg 412w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/acl-security-185x300.jpg 185w\" sizes=\"(max-width: 412px) 100vw, 412px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfa985d elementor-widget elementor-widget-heading\" data-id=\"cfa985d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">security filters <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f19a51d elementor-widget elementor-widget-text-editor\" data-id=\"f19a51d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Security filters is one of the great differentials that MicroStrategy has. Basically, it is to assign a filter to any query made by a user or a group. <\/p>\n<p><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">For example, let&#8217;s imagine that a user runs a simple report, and the query generated in the report is select <i>Month_id, Sum (Revenue).<\/i> <\/span><\/p>\n<\/p>\n<p>If this user is affected by a security filter, the filter corresponding to the security filter in question will be added when generating the query. For example, if you have a security Filter where the Country is &#8216;US&#8217;, the query that will be executed against the warehouse will be <\/p>\n<p><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\"><i>select Month_id, Sum (Revenue) where country = &#8216;US<\/i>&#8216; and logically, the user will not be able to remove this filter.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d272329 elementor-widget elementor-widget-image\" data-id=\"d272329\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"188\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-filter.jpg\" class=\"attachment-full size-full wp-image-2574\" alt=\"Security Filter\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12912db elementor-widget elementor-widget-text-editor\" data-id=\"12912db\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This is, roughly speaking, the functionality of a Security Filter: filtering query-level data by user or group. We can see all the security filters that exist in a project in the &#8220;Project objects&#8221; folder:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bec687 elementor-widget elementor-widget-image\" data-id=\"2bec687\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"561\" height=\"220\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/md-security-filters.jpg\" class=\"attachment-full size-full wp-image-2598\" alt=\"Md Security Filters\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/md-security-filters.jpg 561w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/md-security-filters-300x118.jpg 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24b8a84 elementor-widget elementor-widget-text-editor\" data-id=\"24b8a84\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Beyond what I have explained here, there are many points to be found on this subject. For example, it can also be assigned at the hierarchy level, and there are considerations when working with cubes or Freeform SQL queries&#8230; I&#8217;ll make a more exclusive note about security filters in the future!<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39b13b3 elementor-widget elementor-widget-heading\" data-id=\"39b13b3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">User privileges<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f71462f elementor-widget elementor-widget-text-editor\" data-id=\"f71462f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Just as in ACLs we refer to the access that a user has to a certain object, here we define what a user can do. Privilege is a list of actions that a user (or group of users) can perform in the tool. This ranges from running a report, creating an object, or even using a tool in the suite. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29a0d0b elementor-widget elementor-widget-image\" data-id=\"29a0d0b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"563\" height=\"823\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/microstrategy-desktop-analyst.jpg\" class=\"attachment-full size-full wp-image-2592\" alt=\"MicroStrategy Desktop Analyst\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/microstrategy-desktop-analyst.jpg 563w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/microstrategy-desktop-analyst-205x300.jpg 205w\" sizes=\"(max-width: 563px) 100vw, 563px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b66184d elementor-widget elementor-widget-text-editor\" data-id=\"b66184d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Depending on the user&#8217;s purpose, i.e., the tasks or capabilities to be performed with the tool, a set of privileges will be assigned to the user so that he\/she can perform these tasks. The privileges that a user has will be directly linked to the license he\/she consumes, so we must be very careful when assigning them, since they may end up having an impact on the final cost (and let&#8217;s remember that licenses are not what we commonly call free).<\/p>\n<p><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">You can consult what types of privileges exist<\/span> <a href=\"https:\/\/www2.microstrategy.com\/producthelp\/2019\/SystemAdmin\/WebHelp\/Lang_1033\/Content\/Privileges_by_license-type.htm\" target=\"_blank\" rel=\"noopener\"><u>in this MicroStrategy note<\/u><\/a> <span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">where it explains the privileges that correspond to each license.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-146f7c0 elementor-widget elementor-widget-heading\" data-id=\"146f7c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Security roles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5484b2b elementor-widget elementor-widget-text-editor\" data-id=\"5484b2b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Security roles are a set of privileges that are &#8220;packaged&#8221; or grouped and facilitate management at the project level.<\/p>\n<p><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">If we look at the security role editor, you will see that it is practically the same as the privilege assignment editor:<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95f6176 elementor-widget elementor-widget-image\" data-id=\"95f6176\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"394\" height=\"531\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-role-editor.jpg\" class=\"attachment-full size-full wp-image-2571\" alt=\"Security Role Editor\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-role-editor.jpg 394w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-role-editor-223x300.jpg 223w\" sizes=\"(max-width: 394px) 100vw, 394px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2249ce2 elementor-widget elementor-widget-text-editor\" data-id=\"2249ce2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Basically, it asks for a name for the role and to select what privileges those to whom the role is assigned will have. By default, several security roles are predefined in MicroStrategy. You can find all the security roles in the administration menu, and there, if you edit them, you will be able to see which privileges each one contains. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3af214 elementor-widget elementor-widget-image\" data-id=\"e3af214\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"369\" height=\"360\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/administration-security-role.jpg\" class=\"attachment-full size-full wp-image-2601\" alt=\"Administration Security Role\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/administration-security-role.jpg 369w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/administration-security-role-300x293.jpg 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee2c113 elementor-widget elementor-widget-text-editor\" data-id=\"ee2c113\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We say that the security roles are at the project level because, precisely, when configuring the access that a person or group has to a project, we define it either one by one (as we saw in the previous point, although it is not recommended) or by assigning the role that he\/she will have in each project. For example, in the following image, the user will have access to the Enterprise manager project with Power-user privileges. If you look below, you will see that some privileges such as &#8220;user view filter editor&#8221; and &#8220;Alias objects&#8221; are also assigned by hand. Depending on the color, you will see where you get each permit from.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e559036 elementor-widget elementor-widget-image\" data-id=\"e559036\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"445\" height=\"495\" src=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-role-selection.jpg\" class=\"attachment-full size-full wp-image-2568\" alt=\"Security Role Selection\" srcset=\"https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-role-selection.jpg 445w, https:\/\/bestdatasolutions.es\/wp-content\/uploads\/security-role-selection-270x300.jpg 270w\" sizes=\"(max-width: 445px) 100vw, 445px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aab9206 elementor-widget elementor-widget-heading\" data-id=\"aab9206\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Conclusions <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daf7d5b elementor-widget elementor-widget-text-editor\" data-id=\"daf7d5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>I really believe that MicroStrategy is one of the most cutting-edge tools in terms of security. Once I have encountered a situation where I needed to mask a certain part of an attribute string (yes, it was really a very particular case) but even that ended up being solved with a few lines of code in the SDK, so even having challenges beyond the mentioned layers I have found solutions to security issues. I have yet to do some research to see if there are any highlights for this article in terms of how MicroStrategy&#8217;s cloud platform works, but I think that, for a general analysis of security issues, the goal is accomplished!<\/p>\n<p><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem; font-weight: var( --e-global-typography-text-font-weight );\">So that&#8217;s it for this week, as always, I invite you to ask and comment on any questions, and we&#8217;ll meet again in the next article!<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0048011 elementor-widget elementor-widget-heading\" data-id=\"0048011\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">References<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714639e elementor-widget elementor-widget-text-editor\" data-id=\"714639e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/doc-archives.microstrategy.com\/producthelp\/10.4\/manuals\/en\/Admin.pdf\" target=\"_blank\" rel=\"noopener\">System administrator guide<\/a><\/p>\n<p><a href=\"https:\/\/www.mymstr.com\/microstrategy-access-and-privilege-control-by-project\/\" target=\"_blank\" rel=\"noopener\">MicroStrategy Access and Privilege Control by Project<\/a><\/p>\n<p><a href=\"https:\/\/www2.microstrategy.com\/producthelp\/Current\/SystemAdmin\/WebHelp\/Lang_1033\/Content\/list_of_privileges.htm\" target=\"_blank\" rel=\"noopener\">List of Privileges<\/a><\/p>\n<p><a href=\"https:\/\/www2.microstrategy.com\/producthelp\/Current\/SystemAdmin\/WebHelp\/Lang_1033\/Content\/Privileges_for_predefined_security_roles.htm\" target=\"_blank\" rel=\"noopener\">Privileges for Predefined Security Roles<\/a><\/p>\n<p><a href=\"http:\/\/microstrategyanalytics.blogspot.com\/p\/security-roles-httpswww2.html\" target=\"_blank\" rel=\"noopener\">MSTR Defining sets of privileges: Security roles<\/a><\/p>\n<p><a href=\"https:\/\/www2.microstrategy.com\/producthelp\/2019\/SystemAdmin\/WebHelp\/Lang_1033\/Content\/Privileges_by_license-type.htm\" target=\"_blank\" rel=\"noopener\">Privileges by License Type<\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-614b2ec9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"614b2ec9\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f40a72 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2f40a72\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/bestdatasolutions.es\/en\/blog\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">&lt;&lt; BACK TO BLOG<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As we already know, unlike other visualization tools, MicroStrategy has a much more complex architecture. To begin with, the great advantage it has over the rest of the tools is its semantic layer, which gives us a range of facilities in terms of security, since it allows us to manage a highly complex structure and to manage in great detail the accesses to the information we have.<\/p>\n","protected":false},"author":2,"featured_media":2441,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[73,72],"class_list":["post-3783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-articulo","tag-microstrategy"],"_links":{"self":[{"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/posts\/3783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/comments?post=3783"}],"version-history":[{"count":0,"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/posts\/3783\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/media\/2441"}],"wp:attachment":[{"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/media?parent=3783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/categories?post=3783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bestdatasolutions.es\/en\/wp-json\/wp\/v2\/tags?post=3783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}