There are 2 ways to apply Essbase security in the CXO Software:
In this scenario, the username and password the end user enters to login to CXO are used to connect to Essbase server. The limitations of this scenario are:
Read more about Essbase Authentication Plugin.
The user impersonation scenario can be used to overcome the limitations of the Essbase Authentication plugin scenario.
In this case, the connection to Essabase servers is made using the username and password configured in CXO Software on behalf of the the end user logged in to CXO. In this case the Essbase API function "LoginAs" is used to open the connection.
To turn on Essbase impersonation: