Articles in this section
Category / Section

How can data visibility be managed effectively in Bold BI?

Published:

Overview

In the process of data preparation and dashboard creation within Bold BI, it is often necessary to control the visibility of certain data columns and restrict access to data sources. This ensures that sensitive information remains protected and that users only see the data relevant to their roles. Controlling data visibility is a key aspect of data management in Bold BI. By securing data sources and hiding specific columns, administrators can ensure that users have access to the necessary data without compromising sensitive information. By following the guidelines provided in this article, you can effectively manage data visibility and access within your Bold BI environment.

Securing the Data Source

To maintain data integrity and confidentiality, it is crucial to restrict the ability to edit data sources. Bold BI allows administrators to import users and assign permissions based on their roles and needs. To ensure that a data source remains read-only for certain users, follow these steps:

  1. Navigate to the ‘Manage Permissions’ section for the user.
  2. Set the “Specific Resources” and “Access Mode” to “Read” only.
    Picture1.png

By doing this, users will be able to use the data source for dashboard creation without the ability to make any changes at the data source level.

Picture2.png

For detailed instructions on managing permissions in Bold BI, please refer to the link below:
Managing Permissions in Bold BI

Hiding Columns in the Data Source

To prevent specific columns from being used during dashboard creation, Bold BI provides an option to hide them. This can be done by:

  1. Locating the eye icon next to the column name you wish to hide.
  2. Clicking the eye icon to toggle visibility off.
    Picture3.png

    Once a column is hidden, it will no longer appear in the “Assign Data” section of charts, so it cannot be use into the column section during the dashboard design process.
    Picture4.png

Additional References

Was this article useful?
Like
Dislike
Help us improve this page
Please provide feedback or comments
MM
Written by Mahendran Maragatha Patchai
Updated:
Comments (0)
Please  to leave a comment
Access denied
Access denied