Your feedback is important to us! Email us how we can improve these documents.
Many customers start out using Pentaho Security to secure their Pentaho Business Analytics (BA) server repositories. As the manually created number of users and roles grow over time, customers eventually reach a point where their implementations are no longer viable or supported (approx. 80-100 users/roles).
After you finish migrating your users, roles, and associations from Pentaho Security, you will no longer be using the Pentaho User Console to manage security.
This document uses examples based on sample files to help illustrate the processes. These samples, while not supported by Pentaho, can serve as a template you can to use in your environment. Such efforts should be validated in a test environment prior to advancing to a production environment.
The Best Practices demonstrates how to extract existing users, roles, and role-association data from Pentaho Security using Pentaho Data Integration (PDI) and loading it into JDBC security tables. The process can be adapted to other advanced security options.
|Pentaho||6.x, 7.x, 8.0|
The Components Reference in Pentaho Documentation has a complete list of supported software and hardware.