Creating a Data Visibility Control Table

To support data security filters, both the variable and set-based query methods make use of a data visibility control table and the USER built-in session variable. See Creating Data Security Filters.

Before you create a data visibility control table, analyze which users need access to which columns of the data.

The table can include multiple mappings to multiple attributes or measures.

When you update a visibility control table, you have to re-upload, check its settings, and reprocess it.

To create and use a visibility control table

You need to have Space Administrator permission to upload files, set up, and process the data.

1. Create a mapping table in a spreadsheet or text file.

The visibility control table contains a mapping between the user name (email address) and the column used for filtering the data. For example, the following control table maps a supervisor to a store. The supervisors will see only the information for their stores. In this example, Rob can see stores 1, 2, and 3, but Joe cannot. Only Joe can see store 4.

Username

Retail_Store_Code

rob@acme.com

1

rob@acme.com

2

rob@acme.com

3

joe@acme.com

4

2. Add additional rows for more users, and columns for additional attributes or measures, if needed.
3. Upload the file to the space, like any other data source. See Uploading Flat Files.
4. In the Define Sources -> Hierarchies tab, set up a new hierarchy with a single level and set its and its level key or keys. See Creating Hierarchies.
5. In the Define Sources -> Manage Sources -> Grain tab, assign hierarchies to the data source by setting the grain of the mapping file. See Defining the Grain of a Data Source.
6. In the Define Sources -> Manage Sources -> Properties tab, set up a processing group for the control table. See Assigning Sources to Processing Groups.
7. In the Process Data tab, process the data in order for the security table to be available for security filtering. See Processing Data.
8. Create the security filter. See Creating Data Security Filters.

See Also
Application Security Overview