Pentaho Course ID:
This course is designed to introduce software architects to all aspects of Pentaho security. Security is an area that becomes more relevant when working in a corporate environment that already has a security solution in place. As part of this course, you will learn how Pentaho implements security. You will also learn how to implement custom authentication and single sign-on as well as how to get information about users from publicly available sources.
Most Pentaho embedded applications include some level of data plane or multi-tenancy security. In this course you will learn how to implement data security by restricting access to data on a per user basis. You will also learn how to implement custom authentication and single sign-on as well as how to get information about users from publicly available sources.
This course focuses heavily on the practical application of the topics covered in each section.
The course is aimed at a technical audience with in-depth knowledge of Business Intelligence and the Pentaho BA Suite.
After completing this course, you will be able to:
- die Pentaho Security Architektur zu verstehen
- understand the Pentaho Security Architecture
- implement single sign-on (SSO)
- secure data at the report, cube and model levels
- secure content via folders and reports
This course is aimed at software architects who want to learn how to implement a security solution for Pentaho.
|Module 1||Introduction to the lab environment|
|Exercise||Setting up the development environment|
|Module 2||Overview of the platform architecture|
|Module 3||Introduction to Pentaho security|
|Module 4||User Session Attribute Population|
|Module 5||Authentication and authorisation|
|Module 6||Single Sign-On|
|Exercise||User details and role list service|
|Module 7||Database sharding|
|Module 8||Pentaho Reports security|
|Exercise||Securing a Pentaho report|
|Module 9||Mondrian security|
|Exercise||Dynamic Schema Processor (DSP)|
|Module 10||Metadata Model Security|
|Modul 11||Content Security|
|Modul 12||Various security issues|