Administration Knowledgebase
Do you run the show? We're here for you. Ask your questions.
cancel
Showing results for 
Search instead for 
Did you mean: 

Knowledge Base Articles

Incorta Cloud: Owner vs Manager Access

In this article, we will be discussing the role and permission access for the Cluster Owner and Cluster Manager roles in Incorta Cloud, previously known as Admin and Incorta Admin. Introduction Cluster Owner has full View and Manage access for all th...

DilrajS by Employee Alumni
  • 435 Views
  • 0 comments
  • 3 kudos

Using The Inspector Tool

Introduction For a given tenant, the Inspector Tool checks the lineage references of Incorta metadata objects including tables, schemas, business schemas, business schema views, dashboards, and session variables. It also checks for inconsistencies an...

magnifying_glass.jpg

Backup and Restore Strategy

Introduction Backing up your Incorta environment is one of the most important tasks to perform in order to ensure you have a reliable path for restoring your Incorta reporting environment should the need arise. This document describes the recommended...

backup.jpg
JeffW by Employee
  • 967 Views
  • 0 comments
  • 0 kudos

Integrating with Active Directory

Introduction Many companies use Microsoft Active Directory to manage users and access to corporate networks.  For Incorta, it is often beneficial for the customer to manage users that will have access to Incorta by assigning them to one or more user ...

AD.jpg
JeffW by Employee
  • 1057 Views
  • 0 comments
  • 0 kudos

Log Rotation

Introduction It wouldn't be an understatement to say that applications are responsible for the bulk of end user activity in an organization and these activities are recorded in various logs. They play a critical role in understanding the usage, perfo...

Log.jpg
Mateen by Employee
  • 1380 Views
  • 0 comments
  • 2 kudos

Disaster Recovery

The main objective of disaster recovery is to ensure that customers can respond to a disaster and minimize the effect on business operations. This is done by making sure that data and applications are restored to the pre-disaster functional state with little downtime.

disaster.jpg
Mateen by Employee
  • 632 Views
  • 0 comments
  • 0 kudos

Data Security using Session Variables

OverviewThis article discusses how to address some data security (row level security) use cases ensuring that the solution is scalable and handles large data sets.Please refer to this link for overall support of security in Incorta.An example is prov...

amit_kothari_0-1646263388291.jpeg

Managing Work Across Environments

Introduction Incorta is a full stack data analytics platform that greatly accelerates the traditional BI development cycle; however, we still recommend following traditional software development life cycle (SDLC) best practices to ensure end users a...

topo.jpg
DustinB by Employee
  • 657 Views
  • 0 comments
  • 0 kudos

SSO Best Practices

IntroductionSingle sign-on (SSO) is an authentication method that enables users to log in with a single ID and password once and get access to multiple applications without additional credentials or logins. There are many vendors that offer SSO and I...

sso.jpg
DustinB by Employee
  • 1027 Views
  • 0 comments
  • 0 kudos

Incorta Solution Topology

Introduction Incorta is a full stack data analytics platform that is flexible and scalable enough to offer multiple ways to configure and deploy.  That flexibility allows Incorta to be tailored to each customer’s specific needs. The goal of this art...

topo.jpg
DustinB by Employee
  • 880 Views
  • 0 comments
  • 0 kudos

Testing

Introduction Testing applications for deployment to production is a topic that is well understood and for which there are any number of resources available for determining what the accepted best practices are.  It is likely that your organization ha...

testing.jpg
Tristan by Employee
  • 943 Views
  • 0 comments
  • 1 kudos