Apply your security plan, which you defined during the Pentaho installation and configuration, based on the security requirements of your system.
For information on user security options and implementing big data security, see the following topics:
User security
Big data security
Last updated 8 months ago
Was this helpful?