Databases Reference
In-Depth Information
Figure 19-1
You have learned the various impersonation modes that can be set on data
source object in Analysis Services 2005 databases along with the recommen-
ded option to ensure source data exposed through Analysis Services is se-
cure. You next learn to secure your dimension and cube data appropriately for
your end users.
 
 
Search WWH ::




Custom Search