Manual JDBC Connection Configuration
You must have existing security tables in a relational database in order to proceed with this task.
Follow the instructions below to switch from Pentaho default security to JDBC security, which will allow you to use your own security tables.
If you are using the Pentaho Server and choose to switch to a JDBC security shared object, you will no longer be able to use the role and user administration settings in the Administration portion of the User Console.
Stop the Pentaho Server.
- Open /pentaho-solutions/system/security.properties with a text editor.
- Change the value of the provide property to
- Set up the connection to the database that holds the users and authorities:
- If needed, modify the user queries that pull information about users and authorities:
- If needed, modify the following role queries that pull information about users and authorities.
- Update the default Pentaho admin user on the system to map to your JDBC admin user:
- To fully map the JDBC's admin role to other configuration files, specify the name of the administrator role for your JDBC authentication database in the applicationContext-pentaho-security-jdbc.xml file.
- Open the /pentaho-solutions/system/applicationContext-pentaho-security-jdbc.xml file with a text editor.
- Find the following lines and change the entry key to the key assigned to the administrator role in your JDBC authentication database:
<!-- map ldap role to pentaho security role --> <util:map id="jdbcRoleMap"> <entry key="Admin" value="Administrator"/> </util:map>
- Save and close the file.
- Start the Pentaho Server.
The server is configured to authenticate users against the specified database.