We can provide permissions to specific user to use the report to make it more secure.
Report >> More >> permissions >> add user >> no access to BI admin, BI author and cosumer if needed
Detailed steps with screenshots:
There are several types of encryption techniques used to secure data, each with its own use case and strengths: 1. Symmetric Encryption Us...
No comments:
Post a Comment