Why do I need to log
Your unique login credentials entitle you to a specific set of privileges set by the administrator. These privileges allow you to perform specified functions and prevent you from performing others. Privileges can apply to you specifically, or to a group or a security role of which you are a member. Your login credentials identify your user profile and make your My Reports folder available to you.
not essential that you log in by entering your user name and password; you can
log in as a Guest user (if the administrator has enabled this option). When you
do, you are subject to the permissions established for this user set by the
What is a cookie and how are cookies used at
this Web site?
A cookie is a very small text file placed on your hard drive by a Web server. It is your "identification card" to the server you use for a Web page. It cannot be executed as code or deliver viruses. Only the server that gave you a cookie can read the file.
Depending on their type, cookies can be either temporary or permanent:
Temporary cookies expire when you close the Web browser. In some cases, the MicroStrategy Intelligence Server removes your cookie when you log out; for example, the session ID is removed every time you log out from a session.
- Permanent cookies:
Server, Project, Port, User Preferences, and User name.
- Temporary cookies: Token (Session ID) and other information related to the current user session.
You control which cookies to accept. You can order your browser either to accept all cookies or to alert you every time a cookie is offered, and thus allow you to decide whether or not to accept that particular cookie.
Cookies are a World Wide Web standard, and most users
configure their browsers to accept all cookies without prompting. Cookies are
stored in the Windows repository on the client machine.
What does it mean to
log in as a guest?
The Guest user option has a unique Web configuration that allows a single user to serve as the default login for all users. This user is known as a Guest user. When accessing the MicroStrategy Intelligence Server as a Guest, all modifications and requests are saved at the session level. The MicroStrategy Intelligence Server differentiates Guest users by session ID and prevents Guest users from viewing History Lists that are not theirs. When a Guest user terminates a Web session, the MicroStrategy Intelligence Server releases all data associated with that session.
Although the Guest user is a
special definition, all associated security settings are configured the same way
as those for other users. The degree of access to functions that a Guest user
can have is determined by the permissions granted by the administrator.
Can you tell me about the security subsystem?
Because every MicroStrategy Web user has a unique login, the administrator can restrict access to projects or Web features at the individual or group level. Once a user is authenticated, the MicroStrategy Intelligence Server determines the user's specific object, data, and function access, as configured in the user manager interface. For example, when you browse folders and reports, you can only see those reports for which you have the appropriate permissions.
MicroStrategy Web and MicroStrategy Intelligence Server security support the following services:
- alternative use of Windows "Trusted" Security
- database "pass-through" validation
- security plug-in
- automatic password expiration
- remember my ID and password