-
Concerns about Python Access
Hello, On our Pyramid installation, we're looking to host multiple tenants. However, we've encountered an issue where we can access the host's file system through Pyramid,…
- Answered
-
Member Security - return default if no rows matched
We are looking to apply a security rule to a table using member security. In our security table, there is a default row that should be matched to if the user does not meet the security rules.…
- Answered
-
Log4J Security Vulnerability & Pyramid
There has been a critical notification of a potentially serious vulnerability in the Apache Log4J Java library used extensively in many Java applications world-wide, including Pyramid.…
-
Example of how to use the new Embed framework in Pyramid 2020.11 onwards
Below is a simple sample code example of how to use the new embed framework. Update the username, password and contentID(to get the ID, right click on the item to embed >Metadata) to those relevant…
-
No proxy account was set for user (2020.10)
When content is from an MS OLAP /Tabular data source, after upgrading to Pyramid 2020.10 RTM the following message is shown when opening some content for the master user:…
-
Issue when running a model that has JSON nodes that connect to HTTPS data source
ISSUE: When running an ETL that contains references to an HTTPS site the following error may occur: "Failed to read file list: SSLException: No PSK available.…
-
Security Notice: Linux Installations 2020.00-2020.05
Issue Level: MEDIUM-HIGH Overview The password for the internal system account used with Pyramid installations on Linux servers is not being set correctly to a random value during installation.…
-
Model Definitions, Materialized Content & Data Security
Pyramid 2018 has a powerful modeling tool set that comes complete with a deep security framework that covers both data and content. As a data security platform,…
-
Setting up security roles for Analysis Services with Pyramid
Pyramid's security integration with Analysis Services is tight - allowing customers to securely query OLAP cubes or Tabular models and use any data level security definitions that have been included…