Databases Reference
In-Depth Information
6 Plan and specify SAS Data Integration Studio jobs for data cleansing in the
staging area:
￿ SAS Data Integration Studio contains all of the data cleansing capabilities of
the SAS Data Quality Server software.
￿ Column combination and creation are readily available through the data
quality functions that are available in the SAS Data Integration Studio
Expression Builder.
7 Plan and specify SAS Data Integration Studio jobs for data validation and load:
￿ Ensure that the extracted data meets the data mode of the data warehouse
before the data is loaded into the data warehouse.
￿ Load data into the data warehouse at a time that is compatible with the
extraction jobs that populate the data marts.
8 Plan and specify SAS Data Integration Studio jobs that populate data marts or a
dimensional model out of the central data warehouse.
9 Plan and specify SAS Data Integration Studio jobs that generate reports out of the
data marts or dimensional model. These jobs and all SAS Data Integration Studio
jobs can be scheduled to run at specified times.
10 Install and test the hardware and software that was ordered previously.
11 Develop and test the backup and disaster recovery procedures.
12 Develop and individually test the SAS Data Integration Studio jobs that were
previously specified.
13 Perform an initial load and examine the contents of the data warehouse to test the
extract, cleanse, verify, and load jobs.
14 Perform an initial extraction from the data warehouse to the data marts or
dimensional model. Then examine the smaller data stores to test that set of jobs.
15 Generate and publish an initial set of reports to test that set of SAS Data
Integration Studio jobs.
Planning Security for a Data Warehouse
You should develop a security plan for controlling access to libraries, tables, and
other resources that are associated with a data warehouse. The phases in the security
planning process are as follows:
￿ Define your security goals.
￿ Make some preliminary decisions about your security architecture.
￿ Determine which user accounts you must create with your authentication
providers and which user identities and logins you must establish in the metadata.
￿ Determine how you will organize your users into groups.
￿ Determine which users need which permissions to which resources, and develop a
strategy for establishing those access controls.
For details about developing a security plan, see the security planning chapter in the
SAS Intelligence Platform: Security Administration Guide .
 
 
Search WWH ::




Custom Search