Skip to main content
Pentaho Documentation

Define Security for the DI Server

Overview

Explains how to configure Pentaho security.

grStepGraphicDIConfigDefineSecurity.png

Using security is a best practice, but is not required. If you want to get started quickly or do not have information about your user community, skip this for now and go on to the next stop on the Guide Post graphic. You can always come back to it later.

We support two different security options: Pentaho Security or advanced security providers, such as LDAP, Single Sign-On, or Microsoft Active Directory. This table can help you choose the option that is best for you. If you are using an advanced security provider, see Implementing Advanced Security for the DI Server before continuing the configuration process.

Table 1. Security Decision Table
Explore Considerations Choose Options
Pentaho Security Advanced Security Providers—LDAP, Single Sign-On, or Microsoft Active Directory
Summary Pentaho Security is the easiest way to configure security quickly. Spoon enables you to define and manage users and roles. The DI Server controls which users and roles can access resources in the DI repository.

Pentaho Security works well if you do not have a security provider or if you have a user community with less than 100 users.

If you are already using a security provider, such as LDAP, Single Sign-On, or Microsoft Active Directory, you can use the users and roles you have already defined with Pentaho. Your security provider controls which users and roles can access the DI repository.

Advanced security scales well for production and enterprise user communities.

Expertise Knowledge of your user community and which users should have which roles in the Pentaho system. Knowledge about security in general is not required. Knowledge of your user community and which users should have which roles in the Pentaho system. Knowledge about your particular security provider and its options is required.
Time It takes approximately 5 minutes per user and role to configure Pentaho Security. It takes approximately 1 hour to configure the DI Server to use your existing security provider.
Recommendation Recommended for the Pentaho Trial Download, evaluating, and rapid development. Recommended for production.