ARCHIVED: Naming standards for report security groups

This content has been archived, and is no longer maintained by Indiana University. Information here may no longer be accurate, and links may no longer be available or reliable.

On this page:


Procedure

Any request for a report security group name should be created using the Business Intelligence Management (BIM) tools through Manage Access. When creating a security group name, use the guidelines below to ensure adherence to best practices.

Standards for friendly names

A friendly consumer role or cube role name is an English phrase with a specific construction and length that describes the subject matter of the data contained in the cube. Each business name comprises one or more prime words, optional modifying words, and one class word. It cannot exceed 64 characters in length. Systems developers assist end users in the construction of meaningful business names.

Friendly consumer role or cube role names should meet the following guidelines:

  • As meaningful as possible
  • Self-documenting
  • Easily distinguishable

Consumer role security naming

Below are the security group naming standards for SSAS customers in the Enterprise Business Intelligence (EBI) environment. These guidelines have been established to provide a consistent, structured naming convention.

Naming logic definition

 BL-UITS-EDSS_EBI_SYS_R_I_S_P_XXXXX

Each bolded component of the definition is explained below:

  • SYS: System (for example, SSAS, SQLDB, TAB, BIC BI Center, CBI, etc.)
  • R: Role; job function or title which defines an authority level
    • PUB = Developer role access
    • CON = Consumer role access
  • I: Instance
    • SND
    • DEV
    • TST
    • QA
    • STG
    • PRD
  • S: Subject or organization; a person, subject area, organization, or automated agent
  • P: Permissions approval or access to a resource
    • Access denied = -
    • Access granted =
    • Test = T
    • Read = R
  • XXXXX: Publisher defined

Example

Here is how the naming convention applies to the Enterprise CBI Tester role:

 CBI_TESTER_PRD_IU-IUSM_T_XXXXX
  • SYS: CBI
  • R: TESTER
  • I: PRD
  • S: IU-IUSM
  • P: T (Test)
  • XXXXX: Publisher defined

Cube role security naming

Below are the security group naming standards for SSAS cubes. These guidelines have been established to provide a consistent, structured naming convention.

Naming logic definition

 BL-UITS-EDSS_EBI_SYS_I_O_R_S_DB_P_CU

Each bolded component of the definition is explained below:

  • SYS: System (for example, SSAS, SQLDB, TAB)
  • I: Instance
    • SND
    • DEV
    • TST
    • QA
    • STG
    • PRD
  • O: = Organizational unit
    • DEPT
    • ENT
  • R: Role; job function or title which defines an authority level
    • PUB = Developer role access
    • CON = Consumer role access
  • S: Subject or organization; a person, subject area, organization, or automated agent
  • DB: Database
  • P: Permissions approval or access to a resource
    • Access denied = -
    • Access granted =
  • CU: Cube name

Example: Departmental cube

Here is how the naming convention applies to a departmental cube:

 _SSAS_PRD_DEPT_C_IU-IUSM_IU-IUSM_READ_GL
  • SYS: SSAS
  • I: PRD
  • O: DEPT
  • R: C
  • S: IU-IUSM
  • DB: IU-IUSM
  • P: READ
  • CU: GL

Example: SR subject area cube

Here is how the naming convention applies to an SR subject area cube:

 _SSAS_TST_ENT_C_STU_SA_-PII_ENRLMNT
  _SSAS_PRD_ENT_C_STU_SA_-PII_ENRLMNT
  • SYS: SSAS
  • I: TST and PRD
  • O: ENT
  • R: C (Consumer)
  • S: STU (Student)
  • DB: SA (Student analytics)
  • P: -PII (Access denied to Personal Identifiable Information)
  • CU: ENRLMNT (Enrollment management)

This is document bfai in the Knowledge Base.
Last modified on 2021-09-20 15:14:01.