Data Administrator Guide
Setting up the role of "Data Administrator" in the HENGSHI SENSE system is based on the following considerations:
- In enterprises, data security is a significant issue. Data, as the core asset of the enterprise, should ensure that every access is legitimate. Although the HENGSHI SENSE system is read-only for data, especially data from databases, we still understand the enterprise's attitude towards data assets to ensure its legitimate access. The Data Administrator can act as a gatekeeper in the HENGSHI SENSE system, connecting to the enterprise's internal databases, combined with the settings of the database DBA, to appropriately share within the HENGSHI SENSE system, ensuring that data is only accessed, processed, and explored by legitimate users.
- As mentioned in the Product Overview, the SENSE system does not explicitly distinguish between users from the technical department or the business department. However, from the perspective of the data production process, there is a gap between data assets and the business department in enterprises: the business department understands business logic and requirements better, but few people can understand the underlying data storage structure and models. Therefore, it is necessary for those who understand these (usually the IT department in enterprises) to organize the stored data into a reasonable model for the business department, making it easier for business department personnel to understand, process, and explore. This role in the HENGSHI SENSE system is the Data Administrator.
Data Connections
The Data Administrator should be aware of the relevant configurations of the databases in the enterprise, such as host, port, username, password, etc. Through the HENGSHI SENSE system settings, these databases can be imported, which are called data connections in the HENGSHI SENSE system.
Based on permissions and security considerations, the Data Administrator can communicate and negotiate with the database DBA to restrict the data information that can be seen through this configuration using usernames and passwords.
After completing these settings, the Data Administrator can share the established data connection information with the Data Analyst
role in the system, allowing them to perform data exploration, create charts, etc. By default, sharing is not done to ensure the security of data information.
After creating the dataset, the Data Administrator can share it with the data analyst and manage it together with the data analyst, including data cleaning and preprocessing.
When all this is done, the core function of BI, data chart exploration, has a solid foundation and becomes a natural process.
In this chapter, we will detail the functions of connecting data sources and establishing and managing datasets; in the next chapter, we can start focusing on the data exploration process.