Secure the Pentaho system
Start with user security. Then set up big data security if needed.
Apply your security plan based on your system requirements.
Last updated
Was this helpful?
Start with user security. Then set up big data security if needed.
Apply your security plan based on your system requirements.
Last updated
Was this helpful?
Was this helpful?