This column is the concluding portion of a two-part series on delivery of historical information in the data warehouse environment. This installment examines access control implementation methods for addressing this business requirement. In the first part of this series, we saw that various access control methods can be deployed in a data warehouse environment to ensure security, accessibility and integrity of this information resource. Now we will explore a possible implementation scenario.

For our implementation example, we have three types of reporting options. Pull reports allow authorized users to request information from the data warehouse environment on their own as needed using predefined report templates. Pull reports are selected by users through the reporting tool front end with processing in real time, typically in minutes, against the data warehouse environment. Push reports deliver information to users on a scheduled basis using predefined report templates. Push report processing occurs during scheduled batch cycles, and results are published to users through the reporting tool front end. Both push and pull reports are organized into functional categories or folders to meet business and role-level security needs. Role-level security is typically assigned to the reporting options and folders. Ad hoc reporting is the third option.

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access