Data Security for a Permission
Controls what data users have access to and can be configured through security filters and data access sets.
Overview
In Visier, data security for a permission dictates what data users can access and is configured independently for each analytic object and, if enabled, for sources.
Analytic objects represent the different types of things that users can analyze in the solution. They can be a subject, like an employee, or an event, like an interview. Data for the analytic objects are stored in profile files in the form of tables. The following is an example of an employee profile file, where each row represents an employee record, each column represents a property that describes the employee, and each field contains a property value.
Employee ID | Name | Birthdate | Organization | Location |
---|---|---|---|---|
100 | Carrie | Jan 20, 1980 | R&D | New York |
101 | Stewart | Jun 16, 1967 | Sales | New York |
102 | Laurel | Dec 2, 1992 | R&D | San Francisco |
103 | Doug | Mar 11, 1987 | Marketing | Vancouver |
For analytic objects, data security configurations are managed through security filters and data access sets, which define the breadth and level of access for items users can analyze in the solution.
-
Security filters determine the population of the analytic object that users can access.
-
Data access sets determine the properties and property values that users can access for the analytic object.
By combining security filters and data access sets, you are deciding which group of records are accessible and what specific information from those records a user can see.
Example: Permission that grants users detailed access to all employees in New York.
To create this permission, you would have to define:
- A security filter for the Employee subject that restricts access to only employees in New York.
- A data access set for the Employee subject that gives users detailed access to all employee properties.
Using the previous employee profile file as an example, users with this permission would be able to access the records for Carrie and Stewart and see values for their Employee ID, First Name, Birth Date, Organization Hierarchy, and Location Hierarchy. Users will also be able to use these properties in filters and group bys to analyze the data.
Data security workflow
Use the following workflow when adding data security for a permission:
- Choose the items you want to give users access to. For more information, see Add Access to Items.
- Configure the population access for each item. For more information, see Security Filters.
- Configure the data access sets for each item. For more information, see Data Access Sets.
In this section