Secure the Pentaho system

Start with user security. Then set up big data security if needed.

Apply your security plan based on your system requirements.

Last updated

Was this helpful?