QlikView Security Overview Marcus Spitzmiller. EXCELSQLSAPERP ORACLE SALESFORCE DATA WAREHOUSE INFORMATICA Finance Marketing Sales Operations Presentation.

Slides:



Advertisements
Similar presentations
Attie Naude 14 May 2013 Windows Azure Mobile Services.
Advertisements

1 Integration Made Easy Agile Integration: Connecting Salesforce With Your Enterprise.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Presented by: Tom Connolly, Jason Lieberman Company: BizTech Session.
December 5, OBIEE Technical Conference Security Overview Dan Malone.
Module 1: Installing Internet Information Services 5.0.
T Sponsors Kent Weare Integration MVP, Author API Management Part 1 – An Introduction to Azure API Management BizTalk Summit 2015 – London ExCeL London.
Copyright 2007, Information Builders. Slide 1 WebFOCUS Authentication Mark Nesson, Vashti Ragoonath Information Builders Summit 2008 User Conference June.
A Close Look Inside the SharePoint Engine Randy Williams, MVP MOSS Synergy Corporate Technologies
Copyright © 2006, SAS Institute Inc. All rights reserved. What Is New in SAS Profitability Management (PrM) 2.1? Authors: Jack Zhang Solution & Version:
Internet-Based Client Access
Kuali Rice at Indiana University Rice Setup Options July 29-30, 2008 Eric Westfall.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Higher Express Banner-APEX Integration Framework
ArcGIS Server for Administrators
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
 Background  SDD requirements  System Architecture/Platform  SDD membership registration/password scheme  SDD delivery and monitoring  SDD reporting.
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
JTC Consulting Group Knowledge Management System Jennifer Leigh Carlos Pena Terry Yong 1.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Combining ArcGIS for Server & ArcGIS Online Julia Guard and Matt Monson.
Enterprise Portals Empowering Business via Technology Rajesh Moparthi.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. BI Publisher Server: Administration and Security.
® IBM Software Group ©IBM Corporation IBM Information Server Architecture Overview.
Deck off cards Draft 2 Insert Your Name. Product Overview QlikView Developer Development tool to create data model and graphical interface QlikView Server.
QlikView Architecture Overview
QlikView Integration Overview June Agenda Data Source Integration Web & Application Integration Security Integration Integration with 3rd party.
A Lap around Azure API Apps. Customer Challenges What are API Apps? Creating and Consuming an API App using VS Adding authentication API Connectors Swagger.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
UNCLASSIFIED Matthew Bruce, Senior Solutions Consultant, Adobe Using Logic, Strategy, and DRM to Protect and Manage Content.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED ADMINISTRATION.
QlikView Sizing Walkthru - RAM. Total RAM on the QlikView Server One or more QlikView documents (QVWs) loaded on Server Unaggregated QVW data model QlikView.
Secured Services Best Practices on ArcGIS for Server Patrick Jackson & Thomas Noble.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
QlikView Security Overview. Most common Security challenges faced by a vendor The QlikView platform: a basis for understanding Security Authentication.
Understanding QlikView Web Parts for SharePoint
QlikView and Salesforce.com Integration
Understanding QlikView Web Parts for SharePoint
Azure Active Directory voor Developers
OUR JOURNEY FROM EXCEL TO QLIK
How to Solve BigData Security Puzzle?
QlikView Connector for Informatica Powercenter An Introduction
Advanced QlikView Performance Tuning Techniques
Power BI Security Best Practices
QlikView Governance Application Governance Data Governance
IBM DATASTAGE online Training at GoLogica
IBM Certified WAS 8.5 Administrator
Goals Introduce the Windows Server 2003 family of operating systems
Access and Information Protection Product Overview October 2013
IS 4506 Server Configuration (HTTP Server)
Cal Poly Pomona Identity Management
AD FS Integration Active Directory Federation Services (AD FS) 7.4
Office 365 Development.
Building Security into Your System
Combining ArcGIS for Server & ArcGIS Online
Designing IIS Security (IIS – Internet Information Service)
Securing web applications Externally
01 | Building Windows Store Apps with XAML Part 1
Presentation transcript:

QlikView Security Overview Marcus Spitzmiller

EXCELSQLSAPERP ORACLE SALESFORCE DATA WAREHOUSE INFORMATICA Finance Marketing Sales Operations Presentation QLIKVIEW WEBSERVER BUSINESS DISCOVERY APPS Application QLIKVIEW PUBLISHER BUSINESS USERS IT Admins Authoring OPERATIONAL DATA SOURCES Data Access QlikView Business Discovery Platform QLIKVIEW SERVER Data / Business Analysts Developers QLIKVIEW MANAGEMENT CONSOLE QLIKVIEW DEVELOPER Windows IIS

Security Overview QV Server QV Publisher Web Server Users Authentication Active Directory Single Sign On Integration Custom Integration Session created in QlikView Authorization Active Directory LDAP ODBC Authentication Authorization Lookup Apply

Section Access - Dynamic Reduction

Section Access – Row and Column Entitlements Associate with Data Model to drive data visibility Data Model Entitlements

Section Access – Row and Column Sourced from Management Console Sourced from Database Data Layer

Loop and Reduce - Physical Reduction

Loop and Reduce + Section Access RegionUserDepartment NorthJohnSales NorthGeorgeHR SouthMaryFinance WestJillSales RegionUserDepartment NorthJohnSales NorthGeorgeHR RegionUserDepartment SouthMaryFinance RegionUserDepartment WestJillSales Section Access Sales.qvw Sales_South.qvw Sales_North.qvw Sales_West.qvw Data Model Loop and Reduce

Audit Logging refers to the process of capturing user actions in QlikView Auditable Activities –Open Document –Navigate Sheet –Selections Captured Information –User –Timestamp –Application –Type of Action (application open, sheet open, selection, etc.) –Value No Response Time or Server Resource Impact Auditing

Ports QV Server QV Publisher Web Server Users AD: 389 Authorization Lookup Apply HTTP / HTTPS (80 / 443) Sessions: 4747 (Encrypted) Publish: 4747 (Encrypted) /SMB AD: 389 EDW ODBC

Data QlikView Applications (.qvw) Binary, compressed, difficult to read, not encrypted Customers requiring encryption can leverage Windows EFS QlikView Data (.qvd) Binary, difficult to read, not encrypted Customers requiring encryption can leverage Windows EFS QlikView Publisher QlikView Server Folder access controlled by Windows ACLs Publish

Authentication –Active Directory –Single Sign On Integration (HTTP Headers) –Custom Integration (GetWebTicket API) Application Authorization –Possible via Users / Groups –Active Directory –LDAP –ODBC Data Access –Physical and Dynamic Segmentation (i.e., Loop and Reduce / Section Access) –Secure to Row and Column –Can be secured in motion and at rest Summary

Thank You!