Secure the Pentaho system
Apply your security plan, which you defined during the Pentaho installation and configuration, based on the security requirements of your system.
For information on user security options and implementing big data security, see the following topics:
Last updated
Was this helpful?