Label: favourite

All content with label favourite.
Related Labels: jdbcdaoimpl, relational, development, customization, troubleshooting, ldap, tutorial, active_directory, open, database, build, user_identity, action_sequences, platorm, engineering, userdetailsservice, userrolelistservice, authentication, apache, more »

Page: Adding Extra Roles or Usernames to LDAP Searches (BI Platform)
Suppose that you want to use the role {{Anonymous}} in ACLs. If you don't have that role defined in the LDAP directory, how do you get that role into the list of available roles? Use a {{StaticListLdapSearch}}\! This class simply returns a list of objectscould be {{String ...
Page: Authentication (BI Platform)
act of processing a submitted username and password is called authentication. Note that authentication is a prerequisite to authorization. The Pentaho BI Platform uses Spring Security to process authentication requests. Outofthebox authentication mechanisms provided by the platform are form, basic, and request parameter. The vast ...
Page: Authentication from Third-Party Applications (BI Platform)
Note: See also Web Services Security Web Services Security 2.x3.0.x. The Pentaho BI Server is able to use alternative authentication methods that are available through the Spring Security framework http://static.springsource.org/springsecurity/site/. These include Form Authentication ...
Page: Authentication via X.509 Client Certificate (BI Platform)
X509 Authentication This document describes how to enable authentication via X.509 certificates. It supplements the official Spring Security documentation on this subject http://static.springsource.org/springsecurity/site/docs/2.0.x/reference/x50 9.html. This kind of authentication takes place when (1) using ...
Page: Changing to the JDBC Security DAO (BI Platform)
default, the Pentaho distribution comes with the Hibernatebased security data access object (DAO) enabled. If you already have existing security tables in a relational database, you might want to consider the JDBC backend for its simplicity and flexibility. This page shows ...
Page: Changing to the LDAP Security DAO (BI Platform)
default, the Pentaho BI Platform comes with Hibernatebased security data access object (DAO) enabled. Often, enterprises have an existing directory server accessible by LDAP. This page shows you how to switch to the "LDAP" DAO. The instructions below ...
Other labels: security, authentication, platorm, tutorial, biserver, ldap
Page: Copy of Manual del Usuario de Spoon (Pentaho Data Integration (Spanish))
El diseñador gráfico de trabajos y transformaciones Bienvenid@ Este documento provee una descripción técnica de Spoon. Spoon es el diseñador gráfico de transformaciones y trabajos asociado con el sistema de ...
Page: Creating Your Own Security Data Access Object (BI Platform)
Custom Security DAO If the outofthebox security DAOs (memory, jdbc, and ldap) do not meet your needs, here are instructions for creating your own. Security Data Access Objects Security Data Access Objects introduces the two key interfaces ...
Other labels: security, authentication, platorm, customization
Page: Customizing ACL Decisions (BI Platform)
Creating an IAclVoter IAclVoter Hierarchy Before proceeding, be sure that you have read about domain object authorization Domain Object Authorization in the platform. The section on domain object authorization introduces access control lists (ACLs) and the {{IAclVoter}} interface ...
Page: Domain Object Authorization (BI Platform)
Protecting Action Sequences In a software system, you can secure elements of that system at different levels, depending on your needs. In a web application, you can secure specific URLs. Deeper in the application you might want to secure specific service ...