Business Intelligence and Security with JReport

Share on LinkedInTweet about this on TwitterShare on FacebookShare on Google+

Business Intelligence isn’t just about accessing information, its about making sure that the right people, have the right information, at the right time so decisions can be made more confidently and accurately across the enterprise. However, to achieve this, data security needs to be part of the mix so that members of the organization access only the data for which they are properly authorized. JReport provides users with multiple levels of security to ensure that data is accessed only by authorized individuals.

JReport has a catalog (metadata layer) which all reports use to gain access to data rather than embedding the connection information directly into the report template helping to maintain data source security. In JReport, an administrator simply changes one file to reconfigure all of the report templates that use that data source to change the DBMS host, JDBC URL, user and password, meaning that no changes are required to the individual report templates, providing a level of both internal and external security to users.

Since DBMS security is often not granular enough for a BI environment, JReport also provides resource access security. Each resource can be restricted based on permissions such as Visible, Read, Write, Delete, Execute, Schedule, Grant and Update Status determining what each individual user is allowed to do with various reports. All of these permissions can be set based on any combination of Roles, Groups and Users in an easy-to-use browser based administration console.

Besides the authentication and authorization built into JReport Server, users can also directly access their own security system with single sign on and custom authorization based on the application’s own security system.

Additionally, JReport provides controlled data access at the group, column, and row level so that reports can be viewed differently by multiple people, again based on individual user privileges. Reports can be scheduled and run with the data and access permissions placed directly in the report result. This level of data access helps reduce the number of reports that must be created and maintained. Group level security with JReport also maintains flexibility so that even if many users request their report at the same time, JReport Server can quickly access the report result file without any impact to the DBMS server. Lastly, on-demand reports run directly from the data source also integrate identical row and column level security features.

In addition to those mentioned here, JReport also provides metadata security, parameter security, report bursting, cube level security, etc. ensuring that all of the options needed to manage data security are provided. Security cannot be overlooked when comparing BI tools and JReport is able to provide all of these features and more right out of the box.


Share on LinkedInTweet about this on TwitterShare on FacebookShare on Google+

Leave a Reply

Your email address will not be published. Required fields are marked *

Test * Time limit is exhausted. Please reload CAPTCHA.