EN | DE

Security Fundamentals

Pentaho Course ID:

SA1000

Duration:

2 days

Course description

This course is designed to introduce software architects to all aspects of Pentaho security. Security is an area that becomes more relevant when working in a corporate environment that already has a security solution in place. As part of this course, you will learn how Pentaho implements security. You will also learn how to implement custom authentication and single sign-on as well as how to get information about users from publicly available sources.

Most Pentaho embedded applications include some level of data plane or multi-tenancy security. In this course you will learn how to implement data security by restricting access to data on a per user basis. You will also learn how to implement custom authentication and single sign-on as well as how to get information about users from publicly available sources.

This course focuses heavily on the practical application of the topics covered in each section.

The course is aimed at a technical audience with in-depth knowledge of Business Intelligence and the Pentaho BA Suite.

Learning Goals

After completing this course, you will be able to:

  • die Pentaho Security Architektur zu verstehen
  • understand the Pentaho Security Architecture
  • implement single sign-on (SSO)
  • secure data at the report, cube and model levels
  • secure content via folders and reports

Target Audience

This course is aimed at software architects who want to learn how to implement a security solution for Pentaho.

Business
User
Business
Analyst
Data
Analyst
Software
Architect
Pentaho
Admin
Pentaho
Support

Course schedule

Day 1
Module 1 Introduction to the lab environment
Exercise Setting up the development environment
Module 2 Overview of the platform architecture
Module 3 Introduction to Pentaho security
Module 4 User Session Attribute Population
Exercise Startup actions
Module 5 Authentication and authorisation
Module 6 Single Sign-On
Exercise Single Sign-On
Exercise User details and role list service
Module 7 Database sharding
Exercise IDBDataSourceService
Day 2
Module 8 Pentaho Reports security
Exercise Securing a Pentaho report
Module 9 Mondrian security
Exercise Dynamic Schema Processor (DSP)
Exercise User-defined roles
Module 10 Metadata Model Security
Exercise Data restrictions
Exercise SQL generator
Modul 11 Content Security
Exercise Access selector
Modul 12 Various security issues

Unsere Trainer

Deepening knowledge of software and technology

I am interested in this training!

STANDORTE
it-novum GmbH Deutschland
Hauptsitz:
Edelzeller Straße 44,36043 Fulda
Niederlassungen:
Ruhrallee 9, 44139 Dortmund
Kaiserswerther Str. 229, 40474 Düsseldorf
E-Mail: info@it-novum.com
Tel.: +49 661 103-434
it-novum Zweigniederlassung Österreich
Ausstellungsstraße 50 / Zugang C
1020 Wien

E-Mail: info@it-novum.at
Tel.: +43 1 205 774 1041

it-novum Schweiz GmbH
Hotelstrasse 1
8058 Zürich

E-Mail: info@it-novum.ch
Tel.: +41 44 567 62 07