EN | DE

Security Fundamentals

Pentaho Course ID:

SA1000

Duration:

2 days

Course description

This course is designed to introduce software architects to all aspects of Pentaho security. Security is an area that becomes more relevant when working in a corporate environment that already has a security solution in place. As part of this course, you will learn how Pentaho implements security. You will also learn how to implement custom authentication and single sign-on as well as how to get information about users from publicly available sources.

Most Pentaho embedded applications include some level of data plane or multi-tenancy security. In this course you will learn how to implement data security by restricting access to data on a per user basis. You will also learn how to implement custom authentication and single sign-on as well as how to get information about users from publicly available sources.

This course focuses heavily on the practical application of the topics covered in each section.

The course is aimed at a technical audience with in-depth knowledge of Business Intelligence and the Pentaho BA Suite.

Learning Goals

After completing this course, you will be able to:

  • die Pentaho Security Architektur zu verstehen
  • understand the Pentaho Security Architecture
  • implement single sign-on (SSO)
  • secure data at the report, cube and model levels
  • secure content via folders and reports

Target Audience

This course is aimed at software architects who want to learn how to implement a security solution for Pentaho.

Business
User
Business
Analyst
Data
Analyst
Software
Architect
Pentaho
Admin
Pentaho
Support

Course schedule

Day 1
Module 1 Introduction to the lab environment
Exercise Setting up the development environment
Module 2 Overview of the platform architecture
Module 3 Introduction to Pentaho security
Module 4 User Session Attribute Population
Exercise Startup actions
Module 5 Authentication and authorisation
Module 6 Single Sign-On
Exercise Single Sign-On
Exercise User details and role list service
Module 7 Database sharding
Exercise IDBDataSourceService
Day 2
Module 8 Pentaho Reports security
Exercise Securing a Pentaho report
Module 9 Mondrian security
Exercise Dynamic Schema Processor (DSP)
Exercise User-defined roles
Module 10 Metadata Model Security
Exercise Data restrictions
Exercise SQL generator
Modul 11 Content Security
Exercise Access selector
Modul 12 Various security issues

Our Pentaho Trainer

Dirk Rönsch

Djordja Markovic

Laziz Karimov

Tom Haupt

Deepening knowledge of software and technology

I am interested in this training!