Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Qlik Sense

You're reading from   Mastering Qlik Sense Expert techniques on self-service data analytics to create enterprise ready Business Intelligence solutions

Arrow left icon
Product type Paperback
Published in Mar 2018
Publisher Packt
ISBN-13 9781783554027
Length 514 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (2):
Arrow left icon
Martin Mahler Martin Mahler
Author Profile Icon Martin Mahler
Martin Mahler
Juan Ignacio Vitantonio Juan Ignacio Vitantonio
Author Profile Icon Juan Ignacio Vitantonio
Juan Ignacio Vitantonio
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Qlik Sense Self-Service Model FREE CHAPTER 2. Transitioning from QlikView to Qlik Sense 3. Security Rules: Attribute Based Access Control 4. Master Items in Qlik Sense 5. Qlik Sense on the Cloud 6. Qlik Sense Data Modeling 7. Best Practices for Loading Data in Qlik Sense 8. Advanced Scripting 9. Advanced Expressions in Qlik Sense 10. Overview of Qlik Sense APIs 11. Working with the Qlik Dev Hub 12. Coding in Qlik Sense 13. Creating Extensions in Qlik Sense 14. Integrating QS in Websites via Mashups 15. Other Books You May Enjoy

Auditing security rules

Due to the complexity of ABAC security rules and the high number of rules being created in the QMC, it is very easy to lose sight of what rules have been applied and who gets access to which kind of resources. Governance and overseeing of permissions in a self-service environment are paramount, which is the reason why an auditing feature was introduced in the QMC. From experience, it is convenient, and one of the most valuable resource-monitoring tools in the QMC. In general, it serves two purposes:

  • Assistance in creating new security rules, by validating whether the applied expression logic has the expected outcome. This allows for a smooth trial and error when writing security rules, with absolute confidence at the end that it works as designed.
  • For auditing permission of users. When new users get added to the system, you usually check whether they have...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime