1200
Part IX: Business Intelligence
■ (^) Use the Credentials of the Current User: Uses the current developer’s login to
read the relational database. This can be a good choice for development, but won’t
work when the database is deployed to a server because there is no “current user.”
■ Inherit: Uses the Analysis Services database impersonation method, which defaults
to using the service account, but can be changed in database properties.
FIGURE 53-2
Choosing impersonation method for processing.
Data Source View
A data source describes where to look for tables of data, whereas the data source view
specifi es which tables to use and how they are related. The data source view also associates
metadata, such as friendly names and calculations, with those tables and columns.
c53.indd 1200c53.indd 1200 7/31/2012 10:30:22 AM7/31/2012 10:30:22 AM
http://www.it-ebooks.info