Security Fundamentals

Security Fundamentals (SA1000)

Training Course

This course is designed to introduce software architects to all aspects of security within Pentaho. Security is a common area that needs to be extended when working in an enterprise environment that already has a security solution. As part of this course, you will learn how Pentaho enforces security. You will also learn how to implement custom authentication and single sign-on and how to get information about users from custom sources.

Most embedded uses of Pentaho involve some level of data level security or multi-tenancy. In this course, you will learn how to implement data security to restrict access to data based on user. You will learn how to implement multi-tenancy of data and content, such as folders and reports.

This course focuses heavily on labs to allow you practical hands-on application of the topics covered in each section.

The course is fast paced and intended for a technical audience with a firm grasp of business intelligence and the Pentaho BA suite.

Back to Courses

Description

Id: SA1000
Level: Advanced
Audience: Software Architect
Delivery Method: Instructor-led online, Private on-site, Public classroom
Duration: 2 Day(s)
Cost: $1,350.00 USD
Credits: 2
Category: Software Architecture

 

Duration

2 Days

Upcoming Classes

Online

Instructor-led online training

Location Nov 2017 Dec 2017 Jan 2018 Feb 2018 Mar 2018
Online - NA Dec 5 – Dec 6
Jan 23 – Jan 24
Mar 6 – Mar 7
Online - EMEA Dec 12 – Dec 13

Class dates in bold are guaranteed to run!

Course Benefits

  • Improve productivity by giving your software architects the skills they need to implement a security strategy for Pentaho
  • Interactive, hands-on training materials significantly improve skill development and maximize retention

Skills Achieved

At the completion of this course, you should be able to:

  • Understand how Pentaho Security is architected
  • Get user information at session startup
  • Implement Single Sign-On (SSO)
  • Secure data at the report, cube, and model level
  • Secure content via folders and reports

This course is for Software Architects that need to learn how to implement a security solution for Pentaho.

Students should complete BA1000 Business Analytics User Console for a general understanding of the Pentaho visualization tools and their purposes or have equivalent Pentaho field experience.

The course is fast paced and intended for a technical audience with a firm grasp of business intelligence and the Pentaho BA suite. Familiarity with Java is beneficial.

Students attending classroom courses in the United States are provided with a PC to use during class. Students attending courses outside the US should contact the Authorized Training Provider regarding PC requirements for Pentaho courses.

In general, if your training provider requires you to bring a PC, it must meet the following requirements. You can also verify your system against the Compatibility Matrix: List of Supported Products topic in the Pentaho Documentation site.

  • OS X or Linux desktop operating system. Windows XP & 7 are acceptable but not preferable  (for Macintosh support, please contact your Customer Success Manager)
  • Java 7 installed
  • A Java code editing tool installed such as Eclipse or IntelliJ.  Text editors are not recommended
  • RAM: at least 10GB
  • Hard drive space: at least 2GB for the software, and more for solution and content files
  • Processor: dual-core AMD64 or Intel EM64T

Students attending this course on-site should contact their Customer Success Manager for hardware and software requirements. You can also email us at training@pentaho.com for more information regarding on-site training requirements.

Day 1

Module 1: Introduction to the Lab Environment

  Lab: Setting up the Development Environment


Module 2: Platform Architecture Overview


Module 3: Introduction to Pentaho Security


Module 4: User Session Attribute Population

  Lab: Startup Actions


Module 5: Authentication and Authorization


Module 6: Single Sign-On

  Lab: Single Sign-On

  Lab: User Detail and Role List Service


Module 7: Database Sharding

  Lab: IDBDataSourceService

Day 2

Module 8: Pentaho Reports Security

  Lab: Secure a Pentaho Report


Module 9: Mondrian Security

  Lab: Dynamic Schema Processor (DSP)

  Lab: Custom Roles


Module 10: Metadata Model Security

  Lab: Data Constraint

  Lab: SQL Generator


Module 11: Content Security

  Lab: Access Voter


Module 12: Miscellaneous Security Topics

Onsite Training

For groups of six or more

Request Quote

Public Training

Online - NA

Online - EMEA

Classes marked with Confirmed are guaranteed to run. Sign up now while there is still space available!


Don't see a date that works for you?

Request Class