How do I apply and test user-specific security settings for model reports and AI-generated outputs in eyko?
Step-by-step guide to applying and verifying user-specific security in eyko reports and AI outputs — ensuring that data visibility aligns with access permissions.
It covers:
Accessing and editing a secured data stream in eyko.
Applying field-level security conditions for individual users or groups.
Saving and processing security changes to enforce permissions.
Building model reports with embedded security layers.
Testing restricted access by switching between user profiles.
Creating and validating AI-generated reports that respect the same data security rules.
Comparing visibility between users to confirm proper security enforcement.
Key Steps
1. Accessing the eyko Bikes Stream 0:00
-
Open the relevant stream where all entities, assets, and relationships are defined.
-
Ensure you are in edit mode by selecting the edit option from the dropdown.
2. Selecting the Field for Security Application 0:32
-
Choose the field you want to apply security to (e.g., 'Country').
-
Click on the selected field to edit it.
3. Setting Up Security for Users 1:01
-
Apply a security code for specific users (e.g., Megan Lee).
-
Choose whether to apply security to multiple users or user groups.
-
Set the condition for access (e.g., equal to, contains, or in a series of values).
-
For example, set the condition to 'France' for Megan Lee.
4. Saving Security Settings 1:35
-
Click 'Save and Close' to apply the security settings.
-
Process the stream to ensure changes take effect.
5. Building Reports with Security Layer 1:49
-
Create a report connected to the secured data stream.
-
Use a basic pivot report type to visualize the data.
6. Testing User Access in Reports 2:24
-
Switch to the user profile (e.g., Megan Lee) to test the report.
-
Run the report to verify that only authorized data (e.g., France) is displayed.
7. Creating AI Reports with Security 3:05
-
Use the eyko conversation capability to create a unique AI report for the secured data stream.
-
Select the secured data stream and initiate the conversation.
8. Asking Questions in AI Reports 3:28
-
Formulate questions relevant to the model (e.g., top customer sales).
-
Ensure that the AI retrieves information based on the user's access rights.
9. Comparing User Access in AI Reports 4:23
-
Switch back to a different user profile (e.g., Jon Louvar) and repeat the AI report process.
-
Observe the differences in data access based on security settings.
10. Confirming Security Application 5:36
-
Validate that the security settings are respected in both reports and AI outputs.
Cautionary Notes
-
Ensure that security settings are correctly applied to avoid unauthorized data access.
-
Regularly review user access rights to maintain data integrity.
Tips for Efficiency
-
Familiarize yourself with the edit mode and security settings to streamline the process.
-
Document any changes made to user access for future reference.