Set Data Permissions

<< Click to Display Table of Contents >>

Current:  Create Data Set > Self-Service Data Set > Data Governance 

Set Data Permissions

Previous pageReturn to chapter overviewNext page

Yonghong Z-Suite supports the permission control module which is divided into two sub modules in the system to provide the functions of managing user information and managing access permission respectively. You can select the permission control type. One type is no permission control, another type is the built-in permission control system, and the last type is a user-defined permission control system. You only need to register two types (to realize the defined APIs respectively).

Permission control module can control the authentication permission to the resources. Except for the permission control of resource level, Yonghong Z-Suite also supports the permission control of data level. You can configure the columns of a data set to be available to some users and the rows of the data set to be available to other users. For the operating analysis system of a province, the result that users in different regions can only view the data of the local region can be easily achieved through this function.

While creating a dashboard, you will encounter different users who can get corresponding data according to their role. For example, general employees have no access to the information which can only be checked by the manager. Yonghong Z-Suite provides a function called virtual permission control (VPM) to control information security.

VPM is a control mechanism by which data is extracted according to the user and role for the sake of security. Then how to establish user and role information? Yonghong Z-Suite security module manages user information through the file permission management system and customized permission management system. After selecting an appropriate management system and creating user information, home group of the user, and role information, you can deploy VPM for the data sets to which the permission needs to be controlled. It is mainly to control the permission by adding Filtering and column filtering. Once the VPM is deployed, it is safe to provide data sets for the users who need to edit and view dashboards, and the data security is fully controlled.