So far in MicroStrategy, we have covered a good amount of Schema and Public or Application Objects. It is time now to switch gears and explore objects that will allow administrators to deploy a security layer in MicroStrategy by controlling user privileges and user access to Projects and to specific objects. These objects are part of the MicroStrategy Configuration Objects.
The following topics will be covered:
- MicroStrategy Configuration Objects
- MicroStrategy Users and User Groups and how to create them
- MicroStrategy privileges
- What a MicroStrategy Security Role is and how to create one and assign it
- What a MicroStrategy Security Filter is and how to create one and assign it
- MicroStrategy permissions