• Home
  • MSBI
  • Introduction to SSAS Security in Analysis Services

Introduction to SSAS Security in Analysis Services

  • (4.0)
  • | 1698 Ratings

SSAS Security

  • SSAS BIDS level it supports ‘role-based’ security
  • User (or) group assigns to a Role, each role contains set of responsibilities. (objects privileges – access, Read, write)

Eg:-     VINAY/DWTH                                                    ——– user/Group

Tester                                                                 ——-  Role

Functional testing writing test                  ——- Responsibilities
Cases etc…..
Eg:- Creating two roles (developer_SSAS, Tester –SSA with different objects and different privilege and observing the result.

Enhance your IT skills and proficiency by taking up the SSAS Training.

1. Solution Explore → Roles → Roles → RC → New Role →
Role name:         Developer _Role_SSAS
Role Description: Developers has full  privileges

  • Full Control (Administrator) Membership

Add  → CLICK → Enter the object names to select → VINAY → CHECK NAMES → OK
In ss 2005, even we select full control, we can edit objects and its security. That means the tabs (data sources, cubes ___) enabled for operations.
IN 2008, full control option disables remaining tabs.

Checkout SSAS Interview 

2.  Role → New Role → General
Role Name: Tester __ Role__ SSAS

Role Description: No privileges to Lester (or)

Process database limited privileges membership
Add  → Madhu → check names → Data sources
DS_Text tiles 1                  Read
DS_Texttiles 2                   None
Textiles –Cube Read Drill through

4.  Click Change user icon → roles → Developer—role—SSAS & See the result
5.  Roles → select → tester_role_SSAS and observe

Explore SSAS Sample Resumes! Download & Edit, Get Noticed by Top Employers!Download Now!

List of Related Microsoft Certification Courses:

Subscribe For Free Demo

Free Demo for Corporate & Online Trainings.

Ravindra Savaram
About The Author

Ravindra Savaram is a Content Lead at His passion lies in writing articles on the most popular IT platforms including Machine learning, DevOps, Data Science, Artificial Intelligence, RPA, Deep Learning, and so on. You can stay up to date on all these technologies by following him on LinkedIn and Twitter. Protection Status