Database Reference
In-Depth Information
• Use a specific Windows username and password. I recommend us-
ing this option since it ensures a high-level of security for your data
source. Exploiting this option in an environment where multiple SSAS
developers work on the same project could be cumbersome because
co-workers aren't supposed to share their passwords. In such a case
it is a common practice to use a generic user ID (perhaps with a non-
expiring password), which all developers can share. Keep in mind
that you will need to keep the account's password up-to-date. If you
use an account with a password that will expire, you must update
the data source definition each time the password changes. Note that
Analysis Services never scripts passwords; although you can script
the data source definition using SSMS, it will not display any pass-
words. If the password is incorrect, Analysis Services will report an
error: Logon failure; unknown user name or bad password .
• Use the service account. This option uses the credentials of the ac-
count running the Analysis Services service. You must be a member
of the Analysis Services administrator group (also known as server
role) in order to use this impersonation option. We'll discuss the serv-
er role in Chapter 7 , Analysis Services Security. If the service account
isn't permitted to log on to the relational data source, Analysis Ser-
vices will report an error, for example, Login failed for user ABCDo-
main\XYZUser .
• Use the credentials of the current user. This option is normally used
for data mining, which is beyond the scope of this topic. Do not use
this option for defining data sources not intended for data mining. If
you mistakenly use this option, Analysis Services will report an er-
ror: Data Source XYZ contains an ImpersonationMode that is not
supported for processing operations .
• The Inherit option uses the impersonation option defined at the data-
base level. As mentioned earlier, each project could have multiple
data sources, and therefore it could be beneficial to re-use the defini-
tion for each source based on the database- or project-level setting.
10. Choose the appropriate impersonation level and click on Next .
Search WWH ::




Custom Search