Define security for the Pentaho Server

You also need to establish a security plan for your Pentaho system. Pentaho supports two different security options: Pentaho Security, or advanced security providers, such as LDAP, Single Sign-On, or Microsoft Active Directory.

This table can help you choose the option that is best for you.

Explore Considerations

Choose Options

Pentaho security in PUC and Pentaho security in the PDI client

Advanced security providers

Summary

Pentaho Security is the easiest way to configure security quickly. Both the Pentaho User Console and the PDI client enable you to define and manage users and roles. The Pentaho Server controls which users and roles can access web resources through the User Console or resources in the Pentaho Repository.

Pentaho Security works well if you do not have a security provider or if you have a user community with less than 100 users.

If you are already using a security provider, such as LDAP, Single Sign-On, or Microsoft Active Directory, you can use the users and roles you have already defined with Pentaho. Your security provider controls which users and roles can access Pentaho web resources through the User Console or resources in the Pentaho Repository.

Advanced security scales well for production and enterprise user communities.

Expertise

Knowledge of your user community and which users should have which roles in the Pentaho system. Knowledge about security in general is NOT required.

Knowledge of your user community and which users should have which roles in the Pentaho system. Knowledge about your particular security provider and its options is required.

Recommendation

Recommended for the Pentaho trial download or evaluation only. Caution: Do not use for production.

Recommended for production.

Depending on the security option you choose, refer to the following details in the **Administer Pentaho Data Integration and Analytics** document :

  • If you want to use Pentaho Security, see Manage Users and Roles in PUC and Manage Users and Roles in the PDI client.

  • If you want to use an advanced security provider, see Implement Advanced Security.

  • For information on using Kerberos for security, see How to Enable Kerberos Authentication.

Last updated

Was this helpful?