Select a video below to view

Embedding is More than Showing Charts in an Application

Watch this video to learn why there’s a lot more to embedding applications than what you see -- the charts, graphs, and dashboards. Of course, visualizations like charts or dashboards are part of it. But for a platform to be embeddable, it needs to align with the parent application’s architecture and development technology. It needs to be compatible with that application’s infrastructure. And, it must integrate with its security model. In addition, SaaS or cloud-native…

Security for Embedded Applications: Authorization

In this video, we cover the second “A”: authorization, which refers to defining and enforcing privileges and permissions for a user. There are two common methods for authorizing users: role-based access control (RBAC) and the access control list (ACL). In the first, a user is defined as a member of group -- say finance administration -- and the group as a whole is assigned permissions. Another group in finance -- finance accounts payable -- could…

Security for Embedded Applications: Authentication

In this video, you’ll find out about the three “A”s of security and get an overview of the first “A” -- authentication. Authentication confirms that users are who they say they are. But in embedding, the embedded application has to support the authentication standard of the parent application. And there are multiple standards. The most common is form-based, which prompts the user for a username and password. So users don’t have to login more than…

Security for Embedded Applications: Authorization for SaaS Companies

Watch this video to learn how the two models of SaaS multi-tenancy affect the deployment of embedded platforms. Multi-tenancy models typically fall within one of two approaches: isolated and shared. The isolated model is arguably safer, but the shared model is more efficient for the SaaS company. An embedded analytics platform needs to support both. Moreover, to support the co-mingled or shared model, the embedded platform needs to support row-level security. Row-level security ensures that…

Security for Embedded Applications: Auditing

This video explains the importance of auditing to the security environment for embedded applications. Especially in highly regulated industries like healthcare and financial services, it’s not enough to correctly configure authentication and authorization. You have to be able to prove it that you’ve done it. External regulators and internal auditors will want to review a record -- an audit trail -- of user activities within the application. To provide that, the parent application logs user…

Embedded Applications: Administration and Automation

Watch this video to learn how administration and automation via REST APIs makes life easier when a SaaS company or large enterprise is embedding a BI platform for use by tens or hundreds of thousands of users. In that scenario, you want to look for ways to automate the provisioning of new users and groups. So, it's important for a BI platform to offer administrative APIs that can be scripted from your application. These are…

Embedded Applications are Like Icebergs

This video recaps why embedded applications are like icebergs -- a lot happens under the surface. Visualizations are what we see from an embedded application. That’s the part of the iceberg that’s above water. But under the hood, you have to make sure that the embedded BI platform will work with the parent application's platform and its development environment. You have to be able to deploy it on the same kind of infrastructure. And it…