Database Reference
In-Depth Information
The results are now filtered by Amy Alberts and the members below her in the
parent-child hierarchy. The values for Ken Sánchez and Brian Welcker only con-
sists of the aggregated values from Amy Alberts and the values below her.
In some cases, you may have very complex security requirements, which are hard
to implement, while using the functionality previously shown in this chapter. In order
to use such a model, you can implement security using stored procedures written in
CLR code with Analysis Services. This will allow you to store and maintain the se-
curity information outside of Analysis Services and let the CLR function call the in-
formation and apply it within the cube.
Note
For more information about custom security see the following blogs:
http://blogs.msdn.com/b/jenss/archive/2008/03/05/custom-security-in-sql-server-
analysis-services-2005-2008.aspx
Search WWH ::




Custom Search