Advanced Security

Advanced Security (SLN7000)

Training Course

This course is designed to introduce software architects to all aspects of security within Pentaho. Security is a common area that needs to be extended when working in an enterprise environment that already has a security solution. As part of this course, you will learn how Pentaho enforces security. You will also learn how to implement custom authentication and single sign-on and how to get information about users from custom sources.

Most embedded uses of Pentaho involve some level of data level security or multi-tenancy. In this course, you will learn how to implement data security to restrict access to data based on user. You will learn how to implement multi-tenancy of data and content, such as folders and reports.

This course focuses heavily on labs to allow you practical hands-on application of the topics covered in each section.

The course is fast paced and intended for a technical audience with a firm grasp of business intelligence and the Pentaho BA suite. Ideally, the student is a Pentaho solution builder and/or software developer comfortable with XML, Javascript, and Web 2.0 concepts.

Proficiency with Java programming is essential to complete the lab exercises in this class.

Back to Courses

Description

Id: SLN7000
Level: Advanced
Audience: Software Architect
Delivery Method: Instructor-led online, Private on-site, Public classroom
Duration: 2 Day(s)
Cost: $1,350.00 USD
Credits: 2
Category: Solutions

 

Duration

2 Days

Upcoming Classes

Online

Instructor-led online training

Location Mar 2017 Apr 2017 May 2017 Jun 2017 Jul 2017
Online Jun 6 – Jun 7
Jun 19 – Jun 20
Online - EMEA Jun 19 – Jun 20

Class dates in bold are guaranteed to run!

Course Benefits

  • Improve productivity by giving your software architects the skills they need to implement a security strategy for Pentaho
  • Interactive, hands-on training materials significantly improve skill development and maximize retention

Skills Achieved

At the completion of this course, you should be able to:

  • Implement custom authentication
  • Retrieve user information from custom sources
  • Implement custom security at the database, data model, and report levels
  • Implement custom access to content within the Pentaho repository.

This course is for Software Architects that need to learn how to implement a security solution for Pentaho.

Students should complete BA1000 Business Analytics User Console for a general understanding of the Pentaho visualization tools and their purposes or have equivalent Pentaho field experience.

The course is fast paced and intended for a technical audience with a firm grasp of business intelligence and the Pentaho BA suite. Ideally, the student is a Pentaho solution builder and/or software developer comfortable with XML, Javascript, and Web 2.0 concepts.

Proficiency with Java programming is essential to complete the lab exercises in this class.

Students attending classroom courses in the United States are provided with a PC to use during class. Students attending courses outside the US should contact the Authorized Training Provider regarding PC requirements for Pentaho courses.

In general, if your training provider requires you to bring a PC, it must meet the following requirements. You can also verify your system against the Compatibility Matrix: List of Supported Products topic in the Pentaho Documentation site.

  • OS X or Linux desktop operating system. Windows XP & 7 are acceptable but not preferable  (for Macintosh support, please contact your Customer Success Manager)
  • Java 7 installed
  • A Java code editing tool installed such as Eclipse or IntelliJ.  Text editors are not recommended
  • RAM: at least 10GB
  • Hard drive space: at least 2GB for the software, and more for solution and content files
  • Processor: dual-core AMD64 or Intel EM64T

Students attending this course on-site should contact their Customer Success Manager for hardware and software requirements. You can also email us at training@pentaho.com for more information regarding on-site training requirements.

Day 1

Module 1: Introduction to the Lab Environment


Module 2: Introduction to Pentaho Security

  Lab: Startup Actions


Module 3: Custom Authentication

  Lab: Single Sign-On

  Lab: Custom User Detail Service

  Lab: Custom Role List Service

Module 4: Database Sharding

  Lab: Create a New Custom Data Source in a Sharded Multi-Tenant Environment

Module 5: Report Security

  Lab: Implement Pentaho Report Security

Day 2

Module 6: Analysis Security

  Lab: Create a DSP to Filter Data According to a User Session Variable

  Lab:Use DelegatingRole to Override Security Based on a Session Variable


Module 7: Metadata Security

  Lab: Using Global Metadata Constraints to Limit Data Based on a Session Variable

  Lab: Create a Custom SQL Generator to Filter Report Data


Module 8: Custom Access Control

  Lab: Create a Custom Access Voter to Limit Access to Repository Folders

Onsite Training

For groups of six or more

Request Quote

Public Training

Online

Online - EMEA


Don't see a date that works for you?

Request Class

Advanced Security Ratings

Averaged from 17 responses.

Training Organized
Training Objectives
Training Expectations
Training Curriculum
Training Labs
Training Overall

What do these ratings mean?