-
🚨 1 security filter's unexpected twist will leave you intrigued!
Hi everyone, I think it may be useful information for some of you to know that the 3 options under Security Filters actually doesn't have the same behavior! In fact the "Select Entity based on Cube" feature can be by passed the user itself! And it's by design *! By following the step bellow : Open a layout editor (where…
-
Logging Improvement - DbChanges.Log
Hello all, The DbChanges log is a great tool to have. It provides at a high-level what changed, by whom, at what time…but it's a bit TOO high-level. Currently, the log shows: 20230822 09:55:25Cubesadmin 20230822 09:55:25Cubesadmin 20230822 09:55:26Cubesadmin 20230822 09:55:26Cubesadmin 20230822 09:55:26Cubesadmin 20230822…
-
Logging Improvement - diagnosticYYYYMM.log
Hello all, Within the file "diagnostic«YYYYMM».log", there are various actions that are called out as part of the log. Specifically, if a process clears a cube without selections. [2023-11-01 08:48:10.648 -04:00] WARN { "Username": "x", "CorrelationId": "x", "Procedure": "cap - Update - Volume MS", "TaskId": "x", "Action":…
-
Export and import of users from IDP should use tab delimited .csv instead of comma delimited .csv
Hi, When we export the list of users and their settings from the IDP today, the data gets exported into a .csv file that works with regular commas as separator objects. This can cause problems, as it is possible to have commas in emails, in metadata, in the name of the role, etc. If then the file is opened and worked with,…
-
Track Cubes in Cube Visibility
Cube Visibility in Data Security is a great tool. However, it can be difficult to track which Cubes have been set. Especially when new Cubes are created during development. It would be helpful if you are able to highlight which Cubes have been set.
-
Data Access Control Architecture
1. Abstract Database and Application security refers in general to the range of tools designed to establish and preserve data confidentiality, integrity, and availability. In Board terms it is the definition of the various access levels so that the users are presented and can modify only data relevant to them and for which…
-
Important Update: Changes to Board Cloud Security and Connection Settings
What’s changing? At Board, we prioritize safeguarding your data, information, and other assets managed through our platform. To ensure robust protection, we continuously enhance our cloud security policies. Starting June 30, 2023, we will close the port range 9700-9710 for incoming TCP connections. This change supports new…
-
How to manage security with metadata
1. Abstract Security management is always a complex subject in big applications with large perimeters, we often need to manage multiple roles and rights for a single user, and the best solution to manage that is via the subscription hub Metadata, let’s see what the advanced options are of this feature 2. Context In…
-
Announcement: On-Premises Customers
Please be aware of a critical vulnerability (CVE-2022-42915) in some of our On-Premises ODBC drivers. This vulnerability affects only On-Premises installations of Board ODBC drivers with the HTTP proxy enabled. It is related to the following currently supported drivers: Oracle 8.0 ODBC SQLServer 8.0 ODBC DB2 8.0 ODBC…