Replies: 2 comments 3 replies
-
I think using TM1py with impersonation could be a real shortcut to evaluate effective permissions on the user level. from TM1py import TM1Service
tm1_params = {
"address": "",
"port": 12354,
"user": "admin",
"password": "apple",
"ssl": True
}
with TM1Service(**tm1_params, impersonate="Wim") as tm1:
cellset = tm1.cells.execute_mdx(
mdx="SELECT {([d1].[e1], [d2].[e1])} ON 0 FROM [c1]",
element_unique_names=False,
cell_properties=["Updateable"])
print(cellset) |
Beta Was this translation helpful? Give feedback.
-
Hello Marius, I did some testing on this, thanks for the information. It's nice that we can read and interpret the cell properties ! I was able to use the extract_cell_updateable_property, thanks: |
Beta Was this translation helpful? Give feedback.
-
Hello all,
Image a user complains that he/she does not have read or write access to a certain cube cell. Or the user has access but shouldn't have.
What does the community think about a function that, when given:
, can work out the specific rights of the user to that cell ?
I would typically think this is useful for ad hoc analyses, rather than large sets of users to multiple cells/slices, etc.
Then again, we know that it takes time to do this manually:
See: https://www.wimgielis.com/tm1_cellchange_EN.htm
I find it a hassle to check this, or test when developing models, such that a function might be useful.
The best would be some verbose output ==> the user has Write/Read/None access because:
What do you think ? Reading data from the control cubes would already be a good start, then extracting the right information and bringing it all together to a summary output. Important is that the developer needs to master both Python and the TM1 security model and needs the necessary time ;-) Maybe someone in the community already did this exercise, maybe not in Python but similar and still exploiting the TM1 REST API ?
Beta Was this translation helpful? Give feedback.
All reactions