24 06, 2014

Jedox Database Copying – Security

By |2016-12-09T11:43:15+00:00June 24th, 2014|Categories: How To|Tags: , , , |

When copying the database via the ETL the user management cubes are omitted. One of the things the user management cubes retain, is the information of which group and thus which user can access elements/attributes and cubes cells. One way avoid the omission of the user management cubes is copying the database via the file system, however that will require

9 04, 2014

Jedox ETL – Date Time

By |2016-12-09T11:43:24+00:00April 9th, 2014|Categories: Data Modeling|Tags: , , , |

In this article we are going to discuss how an user can store a date using ETL and Groovy. In order to test the code you need to be logged in via the webinterface and make use of the ETL manager. In case of storing a date in Jedox the user has two options. Either the user stores the date

12 12, 2013

Jedox to SAP Connectivity Part 2 – Setting up the Jedox SAP Connector

By |2016-12-09T11:43:36+00:00December 12th, 2013|Categories: Jedox Ecosystem|Tags: , , |

Continuing on from my prior post on SAP Connectivity Part 1, the next step is configuring the SAP Connector in Jedox ETL. After you have successfully installed SAP JCo Connector, you need to select the SAP Connector component during the Jedox all-in-one install process. This will install the Jedox ETL SAP Connector where it establishes the connection to SAP and supports

15 11, 2013

Introduction to Security in Jedox

By |2016-12-09T11:43:42+00:00November 15th, 2013|Categories: Data Modeling|Tags: , , , |

Jedox has a robust security model. You can allocate permissions down to cell level if required. All of its security objects are held within cubes and dimensions so it is pretty straightforward to set up and apply security. Its user security is group and role based, which means that users are members of groups and groups have certain characteristics defined