Hitachi Vantara Pentaho Community Wiki
Skip to end of metadata
Go to start of metadata

Useful Information

This document is relevant only to the Pentaho BI Platform version 1.2.0 or earlier. See the Pentaho BI Platform version 1.2.1 or later security documentation if you're using version 1.2.1 or later. (You can find the version you are running in several ways: (1) look at the log when the Pentaho BI Platform starts or (2) look at the bottom right of any page within the Pentaho BI Platform.)

The Pentaho Professional BI Platform security system is highly configurable. On one hand that means that the platform can meet the needs of many with only configuration changes.  On the other hand, it means that there are quite a few parts that must be correctly configured before the security system can work properly.

In this section, the various files (usually XML files) that make up the security system are covered.  Before we proceed with the files, let's cover a fundamental Pentaho Professional BI Platform customization of the Acegi Security framework.


UserRoleListService is a Java interface that adds functionality to the existing Acegi Security framework. This functionality is required by the Pentaho Professional BI Platform. The Pentaho Professional BI Platform literally extends (and augments) Acegi Security: Acegi Security classes have been subclassed to provide the Pentaho Professional BI Platform with the required security functionality. Those subclasses then implement the UserRoleListService interface. This is one of the key differences between "ordinary" Acegi Security framework configuration that you would find in the Acegi Security documentation and Pentaho Professional BI Platform security system configuration.

  • No labels