All Products
Search
Document Center

Quick BI:Best Security Practices

Last Updated:May 08, 2024

Access the system using the organization administrator account

After a user purchases a Quick BI and enters the Quick BI-activated organization as an organization administrator, we recommend that you use the permission administrator user to access the system for daily development and operation. You can grant reasonable permissions to the permission administrator user to complete development and management. You should avoid using the organization administrator for daily development and operation.

Create workspaces and specify administrators for the workspaces

Quick BI uses workspaces to manage data objects and users in organizations. Generally, a workspace corresponds to a theme, a project, or a real department of an enterprise. A workspace administrator can manage most of the tasks of the super administrator, including data object management and workspace member management.

Grant minimum permissions to workspace members

A Quick BI workspace provides the following roles: administrator, developer, analyst, and viewer. You can attach roles to workspace members to grant them minimum permissions.

  • For those who need to view the report, but do not need to do report development, only the viewer permission should be given.

  • For users who need to analyze data and develop reports, but not create or modify dataset models, attach the analyst role to them.

  • For users who need to create or modify dataset models and add data sources, attach the developer role to them. Users with the developer role can access the core data assets in the workspace, so attach the developer role with caution.

  • We recommend that you grant workspace administrator permissions only to core management personnel.

Take note of the validity period of permissions

Quick BI allows you to apply for permissions on reports that you were not authorized to access. You must specify the validity period of the permissions. Approvers must pay attention to the validity period of permissions. Make sure that user permissions can be revoked regularly and the permissions are under control.