bbb0777
bbb0777

Reputation: 309

Azure Analysis Services (AAS) Cube Roles: How to grant 2 levels of access, without having overlapping users, who thus get the lower level of access?

Situation is:

We have an AAS cube. We want some users to have access to everything, and some to have limited access. Am currently doing this via roles:

This issue is security is reductive.

If someone is a member of both [Role- All Access] and one of the security groups that rolls up to [Role- Limited Access], that user ends up with Limited Access. At least the way I know to write the roles.

My first thought was to do add an single security group to each role:

https://identity-man.eu/2022/06/07/using-the-new-azure-ad-dynamic-groups-memberof-property/

You can’t use other operators with memberOf (i.e. you cannot create a rule which states member Of group A can’t be in Dynamic group B).

So that doesn't work.

I may be thinking about this the entirely wrong way as well (neither AAS nor dynamic security groups are things I know much about). Thoughts?

EDIT: Maybe the way I wrote the role, is causing security to be reductive? If security were not reductive, that would make it easy.

{
"create": {
"parentObject": {
  "database": "redacted"
},
"role": {
  "name": "Role - Limited Access",
  "modelPermission": "read",
  "members": [
    {
      "memberName": "obj:blablaSecurityGroupGUID",
      "identityProvider": "AzureAD"
    }
  ],
  "tablePermissions": [
    {
      "name": "FACTGeneralLedger",
      "metadataPermission": "none"
       }
     ]
   }
  }
 }

Upvotes: 0

Views: 566

Answers (1)

bbb0777
bbb0777

Reputation: 309

Somehow having the [Role- All Access] as read and process was screwing something up. Switching it to just read, and the security switched back to additive.

Upvotes: 0

Related Questions