Security Fundamentals

Security Fundamentals (SA1000)

Training Course

This course is designed to introduce software architects to all aspects of security within Pentaho. Security is a common area that needs to be extended when working in an enterprise environment that already has a security solution. As part of this course, you will learn how Pentaho enforces security. You will also learn how to implement custom authentication and single sign-on and how to get information about users from custom sources.

Most embedded uses of Pentaho involve some level of data level security or multi-tenancy. In this course, you will learn how to implement data security to restrict access to data based on user. You will learn how to implement multi-tenancy of data and content, such as folders and reports.

This course focuses heavily on labs to allow you practical hands-on application of the topics covered in each section.

The course is fast paced and intended for a technical audience with a firm grasp of business intelligence and the Pentaho BA suite.

Back to Courses


Id: SA1000
Level: Advanced
Audience: Software Architect
Delivery Method: Instructor-led online, Private on-site, Public classroom
Duration: 2 Day(s)
Cost: $1,350.00 USD
Credits: 2
Category: Software Architecture



2 Days

Upcoming Classes


Instructor-led online training

Location Mar 2019 Apr 2019 May 2019 Jun 2019 Jul 2019
Online - APAC Mar 25 – Mar 26
Online - EMEA Apr 22 – Apr 23

Class dates in bold are guaranteed to run!

Course Benefits

  • Improve productivity by giving your software architects the skills they need to implement a security strategy for Pentaho
  • Interactive, hands-on training materials significantly improve skill development and maximize retention

Skills Achieved

At the completion of this course, you should be able to:

  • Understand how Pentaho Security is architected
  • Get user information at session startup
  • Implement Single Sign-On (SSO)
  • Secure data at the report, cube, and model level
  • Secure content via folders and reports

This course is for Software Architects that need to learn how to implement a security solution for Pentaho.

Students should complete BA1000 Business Analytics User Console for a general understanding of the Pentaho visualization tools and their purposes or have equivalent Pentaho field experience.

The course is fast paced and intended for a technical audience with a firm grasp of business intelligence and the Pentaho BA suite. Familiarity with Java is beneficial.

Students attending classroom courses in the United States are provided with a PC to use during class. Students attending courses outside the US should contact the Authorized Training Provider regarding PC requirements for Pentaho courses.

In general, if your training provider requires you to bring a PC, it must meet the following requirements. You can also verify your system against the Compatibility Matrix: List of Supported Products topic in the Pentaho Documentation site.

  • OS X or Linux desktop operating system. Windows XP & 7 are acceptable but not preferable  (for Macintosh support, please contact your Customer Success Manager)
  • Java 7 installed
  • A Java code editing tool installed such as Eclipse or IntelliJ.  Text editors are not recommended
  • RAM: at least 10GB
  • Hard drive space: at least 2GB for the software, and more for solution and content files
  • Processor: dual-core AMD64 or Intel EM64T

Students attending this course on-site should contact their Customer Success Manager for hardware and software requirements. You can also email us at for more information regarding on-site training requirements.

Day 1

Module 1: Introduction to the Lab Environment

  Lab: Setting up the Development Environment

Module 2: Platform Architecture Overview

Module 3: Introduction to Pentaho Security

Module 4: User Session Attribute Population

  Lab: Startup Actions

Module 5: Authentication and Authorization

Module 6: Single Sign-On

  Lab: Single Sign-On

  Lab: User Detail and Role List Service

Module 7: Database Sharding

  Lab: IDBDataSourceService

Day 2

Module 8: Pentaho Reports Security

  Lab: Secure a Pentaho Report

Module 9: Mondrian Security

  Lab: Dynamic Schema Processor (DSP)

  Lab: Custom Roles

Module 10: Metadata Model Security

  Lab: Data Constraint

  Lab: SQL Generator

Module 11: Content Security

  Lab: Access Voter

Module 12: Miscellaneous Security Topics

Onsite Training

For groups of six or more

Request Quote

Public Training

Online - APAC

Online - EMEA

Don't see a date that works for you?

Request Class

Security Fundamentals Ratings

Averaged from 15 responses.

Training Organized
Training Objectives
Training Expectations
Training Curriculum
Training Labs
Training Overall

What do these ratings mean?