User and Group Security
User and group setup can simplify or complicate your content sharing strategy. Here are a few suggestions that will make content sharing more manageable:
User and group setup can simplify or complicate your content sharing strategy. Here are a few suggestions that will make content sharing more manageable:
Introduction For a given tenant, the Inspector Tool checks the lineage references of Incorta metadata objects including tables, schemas, business schemas, business schema views, dashboards, and session variables. It also checks for inconsistencies an...
To those familiar with Incorta, it is no secret how the platform can drastically simplify your organizations ability to understand complex business data. But what about the data required by administrators to properly maintain and monitor the...
The steps below will help you get Incorta's own IncortaMetadata Analytics up and running in your own environment in no time. These steps will help you setup a pre-built schema, business schema and dashboards. Assumptions & Prerequisites Confirm the...
Introduction Backing up your Incorta environment is one of the most important tasks to perform in order to ensure you have a reliable path for restoring your Incorta reporting environment should the need arise. This document describes the recommended...
Introduction Many companies use Microsoft Active Directory to manage users and access to corporate networks. For Incorta, it is often beneficial for the customer to manage users that will have access to Incorta by assigning them to one or more user ...
This article discusses the Security parameters relating to the sharing of objects within Incorta.
Incorta backup and restore scripts are shell scripts that are intended to perform backup and restore for multi-node installations of Incorta. The scripts are capable of backing up and restoring the following parts of the Incorta environment.
Introduction It wouldn't be an understatement to say that applications are responsible for the bulk of end user activity in an organization and these activities are recorded in various logs. They play a critical role in understanding the usage, perfo...
The main objective of disaster recovery is to ensure that customers can respond to a disaster and minimize the effect on business operations. This is done by making sure that data and applications are restored to the pre-disaster functional state with little downtime.
Got the green light to proceed with installing Incorta? The first thing to do is to sharpen the saw.
OverviewThis article discusses how to address some data security (row level security) use cases ensuring that the solution is scalable and handles large data sets.Please refer to this link for overall support of security in Incorta.An example is prov...
Introduction Incorta is a full stack data analytics platform that greatly accelerates the traditional BI development cycle; however, we still recommend following traditional software development life cycle (SDLC) best practices to ensure end users a...
IntroductionSingle sign-on (SSO) is an authentication method that enables users to log in with a single ID and password once and get access to multiple applications without additional credentials or logins. There are many vendors that offer SSO and I...
Introduction Incorta is a full stack data analytics platform that is flexible and scalable enough to offer multiple ways to configure and deploy. That flexibility allows Incorta to be tailored to each customer’s specific needs. The goal of this art...