BISM - Tabular Security Gotcha! (Denied Permissions)
And as the marketing saying goes "Now that I've got your attention". In my last post, (BISM - Tabular Security Model) I commented that role based tabular model security was similar to traditional SSAS. While this is true, the tabular model has no concepts of denied permissions, and I think this is worthy of a small but separate post.
Read more...