Skip to content

Latest commit

 

History

History
53 lines (33 loc) · 4.9 KB

roles-and-permissions-analysis-services.md

File metadata and controls

53 lines (33 loc) · 4.9 KB
title description ms.date ms.service ms.custom ms.topic ms.author ms.reviewer author
Roles and Permissions (Analysis Services) | Microsoft Docs
Learn about the Analysis Services role-based authorization model that grants access to operations, objects, and data.
05/02/2018
analysis-services
multidimensional-models
conceptual
kfollis
kfollis
kfollis

Roles and Permissions (Analysis Services)

[!INCLUDEappliesto-sqlas] [!INCLUDEssASnoversion] provides a role-based authorization model that grants access to operations, objects, and data. All users who access an [!INCLUDEssASnoversion] instance or database must do so within the context of a role.

As an [!INCLUDEssASnoversion] system administrator, you are in charge of granting membership to the server administrator role that conveys unrestricted access to operations on the server. This role has fixed permissions and cannot be customized. By default, members of the local Administrators group are automatically Analysis Services system administrators.

Non-administrative users who query or process data are granted access through database roles. Both system administrators and database administrators can create the roles that describe different levels of access within a given database, and then assign membership to every user who requires access. Each role has a customized set of permissions for accessing objects and operations within a particular database. You can assign permissions at these levels: database, interior objects such as cubes and dimensions (but not perspectives), and rows.

It is common practice to create roles and assign membership as separate operations. Often, the model designer adds roles during the design phase. This way, all role definitions are reflected in the project files that define the model. Role membership is typically rolled out later as the database moves into production, usually by database administrators who create scripts that can be developed, tested, and run as an independent operation.

All authorization is predicated on a valid Windows user identity. [!INCLUDEssASnoversion] uses Windows authentication exclusively to authenticate user identities. [!INCLUDEssASnoversion] provides no proprietary authentication method.See Authentication methodologies supported by Analysis Services.

Important

Permissions are additive for each Windows user or group, across all roles in the database. If one role denies a user or group permission to perform certain tasks or view certain data, but another role grants this permission to that user or group, the user or group will have permission to perform the task or view the data.

In this section

See Also

Create and Manage Roles