Skip to content
  • There are no suggestions because the search field is empty.

How do I apply and test user-specific security settings for model reports and AI-generated outputs in eyko?

Step-by-step guide to applying and verifying user-specific security in eyko reports and AI outputs — ensuring that data visibility aligns with access permissions.

It covers:

  • Accessing and editing a secured data stream in eyko.

  • Applying field-level security conditions for individual users or groups.

  • Saving and processing security changes to enforce permissions.

  • Building model reports with embedded security layers.

  • Testing restricted access by switching between user profiles.

  • Creating and validating AI-generated reports that respect the same data security rules.

  • Comparing visibility between users to confirm proper security enforcement.

Key Steps

1. Accessing the eyko Bikes Stream 0:00

generated-image-at-00:00:00

  • Open the relevant stream where all entities, assets, and relationships are defined.

  • Ensure you are in edit mode by selecting the edit option from the dropdown.

2. Selecting the Field for Security Application 0:32

generated-image-at-00:00:32

  • Choose the field you want to apply security to (e.g., 'Country').

  • Click on the selected field to edit it.

3. Setting Up Security for Users 1:01

generated-image-at-00:01:01

  • Apply a security code for specific users (e.g., Megan Lee).

  • Choose whether to apply security to multiple users or user groups.

  • Set the condition for access (e.g., equal to, contains, or in a series of values).

  • For example, set the condition to 'France' for Megan Lee.

4. Saving Security Settings 1:35

generated-image-at-00:01:35

  • Click 'Save and Close' to apply the security settings.

  • Process the stream to ensure changes take effect.

5. Building Reports with Security Layer 1:49

generated-image-at-00:01:49

  • Create a report connected to the secured data stream.

  • Use a basic pivot report type to visualize the data.

6. Testing User Access in Reports 2:24

generated-image-at-00:02:24

  • Switch to the user profile (e.g., Megan Lee) to test the report.

  • Run the report to verify that only authorized data (e.g., France) is displayed.

7. Creating AI Reports with Security 3:05

generated-image-at-00:03:05

  • Use the eyko conversation capability to create a unique AI report for the secured data stream.

  • Select the secured data stream and initiate the conversation.

8. Asking Questions in AI Reports 3:28

generated-image-at-00:03:28

  • Formulate questions relevant to the model (e.g., top customer sales).

  • Ensure that the AI retrieves information based on the user's access rights.

9. Comparing User Access in AI Reports 4:23

generated-image-at-00:04:23

  • Switch back to a different user profile (e.g., Jon Louvar) and repeat the AI report process.

  • Observe the differences in data access based on security settings.

10. Confirming Security Application 5:36

generated-image-at-00:05:36

  • Validate that the security settings are respected in both reports and AI outputs.

Cautionary Notes

  • Ensure that security settings are correctly applied to avoid unauthorized data access.

  • Regularly review user access rights to maintain data integrity.

Tips for Efficiency

  • Familiarize yourself with the edit mode and security settings to streamline the process.

  • Document any changes made to user access for future reference.

Link to Loom

https://loom.com/share/d901312e808e4273bbe2fd11176030aa

Cookie Policy Privacy Policy