-
❓Follow-up with Security Filters and Refers "To"
A coupe of week ago, I post this (also ticket 00095180 ) https://community.board.com/discussion/17248/1-security-filters-unexpected-twist-will-leave-you-intrigued However now that the 17 novembre patch fixed the issue we finally resume testing on the security again. While the patch improved on the situation we have one…
-
Additional Features in Folder Security
Problem Statement: The users don't want to view all the capsules/ folders and instead would like to navigate from a main Landing capsule to all the other Capsules based on Go to Screen navigation procedures. Issue: The existing Folder security when applied so that the users don't have visibility for other folders, impacts…
-
🧑🤝🧑Impersonate a user features
The idea is for account with developer licence and necessary access to a server to be able to Impersonate any user from his account directly. You select the user you want to impersonate from a drop down list then everything you view - his selects, read & write data, folder access etc.. - are like the member itself on your…
-
Add tools to migrate Roles / Features / Folder security (Life cycle management)
The idea is to add tools for developer to be able to migrate "Roles / Features / Folder" from on the server to another easily You can have many roles and folder security profil in a multiple application context and migrating those from on server to server is a tedious process at the moment. Either an export to csv file or…
-
Procedure Visibility in Security
Just like Cube Visibility in Database Security, it would be meaningful to have the same security functionality for Procedures, where you can have Cubes that control Procedures that are possible to run. It could also be applied to Data Reader (Visibility).
-
Logging Improvement - DbChanges.Log
Hello all, The DbChanges log is a great tool to have. It provides at a high-level what changed, by whom, at what time…but it's a bit TOO high-level. Currently, the log shows: 20230822 09:55:25Cubesadmin 20230822 09:55:25Cubesadmin 20230822 09:55:26Cubesadmin 20230822 09:55:26Cubesadmin 20230822 09:55:26Cubesadmin 20230822…
-
Logging Improvement - diagnosticYYYYMM.log
Hello all, Within the file "diagnostic«YYYYMM».log", there are various actions that are called out as part of the log. Specifically, if a process clears a cube without selections. [2023-11-01 08:48:10.648 -04:00] WARN { "Username": "x", "CorrelationId": "x", "Procedure": "cap - Update - Volume MS", "TaskId": "x", "Action":…
-
Export and import of users from IDP should use tab delimited .csv instead of comma delimited .csv
Hi, When we export the list of users and their settings from the IDP today, the data gets exported into a .csv file that works with regular commas as separator objects. This can cause problems, as it is possible to have commas in emails, in metadata, in the name of the role, etc. If then the file is opened and worked with,…
-
Track Cubes in Cube Visibility
Cube Visibility in Data Security is a great tool. However, it can be difficult to track which Cubes have been set. Especially when new Cubes are created during development. It would be helpful if you are able to highlight which Cubes have been set.
-
Data Access Control Architecture
1. Abstract Database and Application security refers in general to the range of tools designed to establish and preserve data confidentiality, integrity, and availability. In Board terms it is the definition of the various access levels so that the users are presented and can modify only data relevant to them and for which…
-
How to manage security with metadata
1. Abstract Security management is always a complex subject in big applications with large perimeters, we often need to manage multiple roles and rights for a single user, and the best solution to manage that is via the subscription hub Metadata, let’s see what the advanced options are of this feature 2. Context In…
-
Announcement: On-Premises Customers
Please be aware of a critical vulnerability (CVE-2022-42915) in some of our On-Premises ODBC drivers. This vulnerability affects only On-Premises installations of Board ODBC drivers with the HTTP proxy enabled. It is related to the following currently supported drivers: Oracle 8.0 ODBC SQLServer 8.0 ODBC DB2 8.0 ODBC…