Development Tips

New Features to Fortify Multi-Tenant Security

By Ardeshir Ghanbarzadeh
Share on LinkedIn Tweet about this on Twitter Share on Facebook

With a diverse set of users, data security must be a top priority for your application. As your software team looks to deliver embedded analytics to wide range of end users – all with varied needs and requirements – multitenancy is a must-have feature of the analytics solution.

With multi-tenant embedded analytics, there’s no room for error. Your data security must be enterprise-grade, easy to maintain, and ready to go right out of the box. Keep reading to learn about the security challenges software teams face – and how the new Logi Composer can help.

CHALLENGE #1 – As your user base increases, the types of permissions and access rights to data sources and functionalities becomes more complex. You need an easy way to configure and manage data security without limiting each user’s ability to perform meaningful analysis.

SOLUTION – USER-BASED DASHBOARD DISCOVERY WITH VISUAL AND SOURCE ACCESS PERMISSIONS

We’ve introduced new UIs for your development teams to easily configure and manage all dashboard and data source security. With this recent enhancement, developers can more easily define end-user access, self-service capabilities, and dashboard interactivity at the feature level.

The new dashboard access control page will allow you to define when a dashboard is accessible and by which users or groups. Dashboard creators and admin can now easily manage individual privileges to read, edit, create, share, and delete dashboards.

 


Source Permission

For access to data sources, permissions can be set at the account, group, and user levels to restrict access and control what each user can see. This ensures a secure data discovery experience for your end users, even with multisource data.

With these enhancements, developers can easily define end-user access, guardrail self-service, and toggle dashboard interactivity at the feature level.

CHALLENGE #2 – You need to control data access down to the cell row level as it relates to different user roles. At the same time, you want to promote efficiency by storing data for multiple tenants in a single table – the challenge is enforcing a logical separation between tenant data on the same table.

SOLUTION – ROW AND COLUMN SECURITY FOR FLEXIBLE ACCESS CONTROL

We’ve made several enhancements to row and column security. Row data security can now be set at the account, group, and user level. You can search for users and then associate row security filters with active accounts, users, and groups from their accounts when needed.

 


Row and Column Security

Column security is now supported at the group level with single or multiple group associations. This enables you to select multiple groups at a time to use one filter for different groups.

Additionally, we now support interpolation for the whole account, groups, and separate users. You will now be able to effectively map users to different variables that decide what data they see.

CHALLENGE #3 – As a product manager, you strive to provide the best in-app analytics experience but need to do so without compromising data security. As a developer, you want to minimize your app’s cyberattack surface. And as an end-user, you don’t want the hassle of inputting login credentials several times throughout the application.

SOLUTION – SECURE AND PRODUCTIVE USER EXPERIENCE WITH TRUSTED ACCESS

With Trusted Access, your product team can deliver a seamless user experience resulting in higher productivity, app usage, and user adoption.

Single sign-on enables end users to log in to the main app once, passing their security information on to the embedding platform. This enhancement also supports user access tokens with defined authorization rules accounting for user privileges, object permissions, security filters, and any specific user attributes used in interpolation.


Trusted Access

User access tokens are then used in the main application to service embedded components such as dashboards for the respective users.

With these enhancements, software teams and end users alike can feel confident in their data security.

This post is part of a three-part series showcasing new features in Logi Composer 6:

  • To read about how expanded customization puts analytics in context, check out this blog post.
  • To read about new self-service capabilities for the ultimate customization of the user experience, check out this blog post.

For more information on our latest updates, head over to our documentation.

Originally published May 18, 2021; updated on August 12th, 2021

About the Author

Ardeshir Ghanbarzadeh is the Director of Product Marketing at Logi Analytics. He has over 20 years of experience in product marketing, product management and customer success and has held positions at Epitiro, Spirent Communications, Metrico Wireless and VoIP Logic where he created products and services for companies such as Panasonic, AT&T and QUALCOMM.