Yellowfin Evaluation Guide

Yellowfin is used for both enterprise analytics and embedded analytics use cases and for building bespoke analytical applications. Use this guide to ensure Yellowfin is the right technical fit for your requirements.

  1. Evaluation Guide
  2. Security
  3. Security Overview

Security Overview

  • Security Overview

    Updated 15 June 2020

    What are the elements of Yellowfin’s’ security model?

    The core elements related to security are:

    • Users – an individual user who accesses the system
    • Groups – users can be combined together into Groups – such as which department they might work in. A user can belong to many Groups. Security access and other assignments can be performed at individual level, or Group level for greater efficiency.
    • Functions – these are granular system level privileges that allow the use of different functionality in Yellowfin, for example the ability to create certain types of content or change administrative settings
    • Roles – roles are groupings of functions – these can be assigned to users or groups to grant system privileges.

    How can I restrict the access that users get?

    Yellowfin has very fine-grained control over access to system functions and content. Users are given access by assignment to roles – either directly or via their membership of a group. Roles define which system functions they can access. Users and Groups are also given access to content – either by having access to specific content folders or by being granted direct access to a piece of content.

    Can I administer multiple companies within a single instance of Yellowfin?

    Yes – Yellowfin has rich multi-tenancy capabilities. Many Client Organizations can be established within a single Yellowfin instance. Each organization is logically separate and can have it’s own unique branding and content – or can share content from the parent organization.