Database Reference
In-Depth Information
The results are now filtered by
Amy Alberts
and the members below her in the
parent-child hierarchy. The values for
Ken Sánchez
and
Brian Welcker
only con-
sists of the aggregated values from
Amy Alberts
and the values below her.
In some cases, you may have very complex security requirements, which are hard
to implement, while using the functionality previously shown in this chapter. In order
to use such a model, you can implement security using stored procedures written in
CLR code with Analysis Services. This will allow you to store and maintain the se-
curity information outside of Analysis Services and let the CLR function call the in-
formation and apply it within the cube.
Note
For more information about custom security see the following blogs:
Search WWH ::
Custom Search