Topic: Security
-
This article describes how to read the active security roles in a Tabular model for Power BI or Analysis Services. This way, you can use measures and calculation groups to customize a report based dynamically on security roles active for… Read more
-
How to apply dynamic security roles in a hierarchical organization to minimize the maintenance effort on the security configuration and obtain the best performance at query time. Watch now
-
This article describes how to apply dynamic security roles in a hierarchical organization to minimize the maintenance effort on the security configuration and obtain the best performance at query time. Read more
-
This article describes how to hide measures from a group of users by leveraging object-level security in Power BI and Analysis Services. Read more
-
When you create and publish a composite model using DirectQuery for Power BI datasets and Analysis Services, you should pay attention to the minimal permissions required to consume data. For example, consider the following scenario: Base is a shared dataset… Read more
-
Explore how you can hide columns and tables to Power BI users by using the Object Level Security (OLS) feature released in February 2021. By hiding objects, you also hide derived calculations like measures, calculated columns, and calculated tables. The… Watch now
-
Applying security roles to a Power BI model or to an SSAS Tabular database might impact query performance. This article describes existing issues and possible workarounds. This is an advanced article, a good knowledge of storage engine and formula engine… Read more
-
This article describes how to implement non-visual-totals with security roles in Power BI and Analysis Services Tabular, which by default show only visual totals of measures in the model. Read more
-
Using SSAS 2005/2008, there is no way to apply security to DRILLTHROUGH actions, so we cannot decide whether a specific user is authorized or not to perform a specific action. This is a “by design” behavior, since DRILLTHROUGH actions are initiated at Read more