Secure the Pentaho system

Apply your security plan, which you defined during the Pentaho installation and configuration, based on the security requirements of your system.

For information on user security options and implementing big data security, see the following topics:

Last updated

Was this helpful?