Preview

Tableau Server Case Study

Powerful Essays
Open Document
Open Document
1469 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tableau Server Case Study
Data Security in Tableau
There are 4 main components of data security in Tableau Server:
1. Authentication
2. Authorization and Permissions.
3. Data Security.
4. Network Security.

1. Authentication:
This feature in tableau is enabled while doing the installation of tableau server.
There will be two options of authentications available in Tableau server, they are:
1. Use Active Directory
2. Use Local authentication
At corporate level, it is suggested and best practice to use Active Directory (as this links the Tableau server to the company’s active directory). We can use Enable automatic logon option, so that the user who logged in system can directly access Tableau online without providing user id and password.

2. Authorization and Permissions:
…show more content…
Client to Tableau Server: The client can be a web browser, Tableau Desktop, or the tabcmd utility.
A Tableau Server client can be a web browser, Tableau Desktop, or tabcmd commands. Communications between Tableau Server and its clients use standard HTTP requests and responses. Tableau Server can also be configured for HTTPS (see Configure External SSL). When Tableau Server is configured for SSL, all content and communications between clients are encrypted using SSL, and the HTTPS protocol is used for requests and responses.
Passwords are communicated from browsers and tabcmd to Tableau Server using 512-bit public/private key encryption. Tableau Server sends a public key to the browser, which uses the key to encrypt the password for transmission. Each encrypted transmission uses a key one time before it is discarded. This means that passwords are always secured regardless of the use of SSL. If SSL is enabled, SSL encryption is used in addition to the 512-bit public key encryption of passwords.
4.2. Tableau Server to your database(s): To refresh data extracts or handle live database connections, Tableau Server needs to communicate with your
…show more content…
It uses native drivers to connect to databases whenever possible and relies on a generic ODBC adapter when native drivers are unavailable. All communications to the database are routed through these drivers. As such, configuring the driver to communicate on non-standard ports or provide transport encryption is part of the native driver installation. This type of configuration is transparent to Tableau.

When a user stores credentials for external data sources on Tableau Server, they are stored encrypted in Tableau Server's internal database. When a process uses those credentials to query the external data source, the process retrieves the encrypted credentials from the internal database and decrypts them in process.
4.3. Server component communication: This applies to distributed deployments only.
You can configure Tableau Server to use Secure Sockets Layer (SSL) for encrypted communications on all traffic between the Postgres repository and other server components. By default, SSL is disabled for communications between server components and the repository. For more information, see Configure Internal

You May Also Find These Documents Helpful

  • Satisfactory Essays

    - SSL and HTTPS will applied to online transactions. Enabling encrypted connection through user login to encrypted pages until sign out. (System/ Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Administrators could have the option of layering security by enforcing the use of PIN numbers, hardware tokens, client certificates and other forms of secure authentication on top of AD or LDAP (Lightweight Directory Access Protocol). After implementation of several security policies, I would create a SSL (Secure Socket Layer) VPN (Virtual Private Network) network, a form of VPN that can be used with a standard Web browser. In the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. It's used to give remote users with access to Web applications, client/server applications and internal network connections. SSL VPN doesn’t require specialized client software on the user computer.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Acct 504 Week 1 Quiz

    • 4686 Words
    • 19 Pages

    Client information is saved in an Excel spreadsheet file. This file was first created many years ago as…

    • 4686 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    3. Store passwords using reversible encryption is required for certain remote access protocols. It is also required to VPN in most cases.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    4. In which process would a user be asked to enter a token- generated password?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Math Probabilities

    • 602 Words
    • 3 Pages

    I have granted you all access to query the tables in my account. You can access them by typing suebrown., so to access the publishers table, type suebrown.publishers. As a second alternative, you can use the scripts in blackboard to create the tables in your own oracle space. It is your choice how you want to do this – just make sure that if you create the tables in your own directory that you do not change the data.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Social Work Case Study

    • 1860 Words
    • 8 Pages

    The definition of client as defined in our textbook is, “One who has either sought help from a social worker or is served by an agency employing a social worker.” Therefore, in this case study I would consider both Frank and Angela Bertollini to be the clients.…

    • 1860 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Today’s technologies allow users to prove their authenticity and with data encryptions allow data to be transmitted safely over the medium. Data encryption should be at a satisfactory level of security to protect against intruders, thus data integrity have been compromised. User authentication must also be present with the encryption and data transmission process to ensure that the data sent are received by authorized receiver. Other than data encryption, a good firewall should also be implemented on the database server to avoid external intruders from accessing unauthorized…

    • 1704 Words
    • 7 Pages
    Better Essays
  • Better Essays

    artwork, the name of the artist, and each piece of artworks location. Before moving any further,…

    • 823 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Database Administrators

    • 1626 Words
    • 7 Pages

    Database is any collection of data or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval, modification, and deletion of data in conjunction with various data-processing operations.…

    • 1626 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    which of course is the output of the data. The way the data is saved is through The Cloud…

    • 878 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Sales Monitoring System

    • 305 Words
    • 2 Pages

    • It will ensure data integrity by having the linking between tables in the database where the update or any change of data could take effect in once at a time.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays