Creating a CBI security group in the BIM

Follow the instructions below to create and submit a new Consolidated Business Intelligence (CBI) security group in the Business Intelligence Manager (BIM) site.

On this page:


Accessing security group management tools in the BIM

To access the security group management tools in the Business Intelligence Manager (BIM) site:

  1. Navigate to https://bim.bi.iu.edu/ and provide the necessary authentication credentials.
  2. In the pane on the left, under "Manage Options", expand "Security Management" by clicking the plus sign to the left of the folder name.
    Note:
    If the pane on the left is collapsed and you don't see the "Manage Options" heading, click either >> or Manage Options on the left edge of the page.
  3. Below "Security Management", click Manage Access.

The pane on the right will be populated with search criteria for the BIM security groups. In the right pane, click Create Security Group.

Creating a security group

Refer to the following information as you fill out the form in the "Create" dialog:

Security group type

Report publishers will need to create two types of security groups in the BIM:

  • CBI Consumer Tester: This security group type controls who can access reports in the test environment for a particular business unit.
  • CBI Consumer Production: This security group type controls who can access reports in the production environment for a particular business unit.

Select the appropriate type of group from the Security Group Type drop-down menu, depending on the environment in which you'll deploy your report.

Data security group type

If this security group will be used to secure data from the IU Data Warehouse (DSS1PRD) or Enterprise Analysis Services cubes, select Enterprise from the Data Security Group Type drop-down menu. Alternatively, if this group will be used to secure data from other sources (e.g., a departmental database), select Departmental.

Security group technical name

In the "Security Group Technical Name" text box, enter a technical name for your new security group. The technical name is made up of a series of words or abbreviations separated by underscores, such as IN_ADM.

Note:
The generated security group will be prepended with BL-UITS-EDSS_EBI_CONSUMER_PRD_ for consumer groups and BL-UITS-EBI_CBI_TSTR_PRD_ for tester groups.

Security group name

In the "Security Group Name" text box, enter a brief, descriptive, user-friendly name for your new security group. The group name is made up of whole words that describe the function of the group, such as "IUPUI Upper Administration".

Campus

If you selected Enterprise from the Data Security Group Type drop-down menu, you'll need to select a campus code from the Campus drop-down menu. Systemwide (SY) is often the correct campus code for enterprise data.

Subject area

If you selected Enterprise from the Data Security Group Type drop-down menu, you'll need to select a subject area from the Subject Area drop-down menu. This field will not appear until after you've selected a campus.

Note:
Campus and Subject Area selections are the basis for workflow routing for security group approval by the appropriate data manager; for more, see Data manager approval.

Adding members to your security group

To add members to your new security group:

  1. In the text box above the Add Users button, enter each user's IU username. To add multiple users, separate their usernames with a comma.
  2. Click Add Users.
  3. At the bottom of the dialog box, click Submit. You may need to scroll down to see this button.
    Note:
    No users are actually added to the security group until you click Submit.

Users who have not completed the Acceptable Use Agreement cannot be added to BIM security groups.

If you click Submit to add users to your group but some of the users you're adding have not completed the Acceptable Use Agreement, you'll see an error message listing those who have not done so. Manually remove these users from the text box before you resubmit your request. Users can go to the Acceptable Use Agreement task in One.IU to complete it.

Students are not eligible to complete the Acceptable Use Agreement. Should you need to add a student to a BIM security group, fill out the EDSS Support Form and describe the necessary change.

Description

In the "Description" text box, enter a lengthier description of your new security group's purpose.

Group owner

The name of the individual creating the security group will appear as "Group Owner". To add the group owner to the new security group, check the box to the right of the group owner's name.

Owner delegate

In the "Owner Delegate" text box, enter the username of someone in your unit who has publishing rights in your Tableau project. To add that user to the security group, check the box to the right of the user's name.

Notes or justification

In the "Notes or Justification" text box, you can enter information about why the group was created or modified (e.g., the users added or deleted, the reason for the change, etc.).

Submitting the security group

The submit button is labeled differently depending on the data you entered above:

  • If you selected Enterprise from the Data Security Group Type drop-down menu, click Submit for Approval to submit your security group. A workflow is initiated for data manager routing, and the group will be locked until the request is approved or disapproved. Once a data manager has dealt with your request, the editing lock will be removed, and you can use your new security group when publishing a report.
  • If you selected Departmental from the Data Security Group Type drop-down menu, click Submit to submit your security group. The group is immediately available for use.
Note:
New groups will not be published on the Tableau Server until they are associated with a Tableau workbook; see How do I publish a report to the CBI?

This is document amtj in the Knowledge Base.
Last modified on 2017-06-06 16:21:20.

  • Fill out this form to submit your issue to the UITS Support Center.
  • Please note that you must be affiliated with Indiana University to receive support.
  • All fields are required.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.

  • Fill out this form to submit your comment to the IU Knowledge Base.
  • If you are affiliated with Indiana University and need help with a computing problem, please use the I need help with a computing problem section above, or contact your campus Support Center.

Please provide your IU email address. If you currently have a problem receiving email at your IU account, enter an alternate email address.