1. First, create a new database by clicking on the File button in the PowerOLAP application window and selecting the New Database command.
2. Enter a name for the new database (e.g., NewDBSecure) and browse for a location where the database will be saved.
3. Enable the Secure Database check box, boxed in the figure below.
4. Click OK.
Directly the PowerOLAP Database Login dialog box will appear, where you can configure your user and password.
5. Enter a <User Name> (a default is initially supplied, based on your Windows networking User Name) and enter and confirm your <Password>.
Important
User Name is not case-sensitive, but Password IS CASE SENSITIVE. A Password
must be at least eight (8) characters.
6. Click OK. You are returned to the main PowerOLAP window.
Notes
If you establish Security when you create a new database, the User Name
you use (in the example, YourName) will automatically be placed in the
Administrator Group, with full privileges to every aspect
of the database, as discussed immediately following (How to manually create
and place Users in Groups, and how to assign privileges, will be explained
later in this section).
7. In the PowerOLAP ribbon, go to Model
tab, then in the Security control group select Users and Groups
icon or Maintain
Users & Groups command.
The User & Groups dialog box appears.
Note that the example YourName appears in the Administrator Group, along with a User called Administrator (shown expanded and circled in the following figure).
Important
There is always a user that is created in a Secure Database, named Administrator,
who appears in the Administrator Group. The default password for Administrator
is, likewise, "Administrator" (no quotes). A user with Administrator
privileges may change any user's Password (including his own) and define
every aspect of other users' access to database information, and may delete
users. However, the user Administrator can neither be deleted from the
database nor moved out of the Administrators Group (Nor can the Administrator
Group be deleted or renamed).
8. If you are following the example, click OK.
At this point, you could proceed with doing everything required to build your database—creating Dimensions, Cubes, Slices and an advanced, very detailed, adjustable security setup for database users. In other words, in this scenario you would build the database first, then grant privileges to Users and Groups, since most privileges are predicated on providing User/Group access to Meta Data and Fact Data existing in the database.
At this point, note that a user with Administrator rights has full access to the three Security selections on the Model tab (see the three commands in the Security control group):
After you close a Secure Database, thereafter when a user opens it he/she must supply a valid User Name and Password, unless Security has been disabled.