Here is a list of and links to our existing security documentation — organized according to our PPS book categories (Architecture and Planning, Deployment, and Operations):
Architecture and Planning
- Planning Application Business Objects (Security)
- Planning Server security
- Security Roles - definition of
- Authentication
- Authorization
- Planning Server administrative roles
- Planning Server business roles
- Predefined functional roles for workflow
- Communication security
- Kerberos delegation for Planning Server
- Secure Sockets Layer (SSL) security
- SQL Server security
- Analysis Services security
- Native SQL and MDX security
- Identify risks and define mitigation plans
- Security (implementation) considerations (Business roles, Administrative roles, Deployment accounts)
- Monitoring Server security options
- Monitoring Server account considerations
- Monitoring Server application pool accounts
- Monitoring Server security considerations (Authentication, Application security, Kerberos delegation security)
Deployment
- Deploying Planning Server securely
- Enabling Secure Sockets Layer (SSL) security for Planning Server
- Planning Administration Console access security
- Kerberos authentication and delegation for Planning Server
- Configure Planning Server prerequisites for Kerberos authentication
- Configure Planning Server for basic Kerberos authentication
- Configure Planning Server for Kerberos delegation by using a domain user account
- Configure Planning Server for Kerberos constrained delegation
- Using Planning Server roles
- Granting users permissions to access the Planning Server application database
- Configuring data source credentials
- Monitoring Server application pool identity account considerations
- Deploying Monitoring Server securely
- Enabling Secure Sockets Layer for Monitoring Server
- Kerberos authentication and delegation for Monitoring Server
- Configure Monitoring Server prerequisites for Kerberos authentication
- Configure Monitoring Server for basic Kerberos delegation
- Configure Monitoring Server for Kerberos delegation by using a domain user account
- Configure Monitoring Server for Kerberos constrained delegation
Operations
- Security roles
- About configuring staging database permissions
- Create a login
- Grant access to the database
- Grant access to database objects
- About synchronizing dimensions and models (Security)
- About loading dimensions (Security)
- About loading models (Security)
- Scriptable data integration (Security)
- Upgrading from a prerelease version of Planning Server (Security requirements)
MSDN Blog Postings » Blog Archive » PerformancePoint Server Security and Kerberos
This post originated from and is provided by the MSDN Blogs RSS feed. The original post of the article can be found here.
No comments:
Post a Comment