There are 2 ways to apply Essbase security in the CXO Software:
In this scenario, the username and password the end user enters to login to CXO are used to connect to Essbase server. The limitations of this scenario are:
Read more about Essbase Authentication Plugin.
Note: The term SSO in the context above means that credentials provided by user in CXO are being used for connecting to essbase as well. It should not be confused with Single Sign On behavior between applications in a browser.
The user impersonation scenario can be used to overcome the limitations of the Essbase Authentication plugin scenario.
In this case, the connection to Essabase servers is made using the username and password configured in CXO Software on behalf of the the end user logged in to CXO. In this case the Essbase API function "LoginAs" is used to open the connection.
To turn on Essbase impersonation: