Mastering Row-Level Security (RLS) in Bold BI®: Secure Multitenant Data Access for Authenticated and Anonymous Users [Webinar Show Notes] | Syncfusion Blogs
Detailed Blog page Skeleton loader
Mastering Row-Level Security (RLS) in Bold BI® :Secure Multitenant Data Access for Authenticated and Anonymous Users [Webinar Show Notes]

This blog provides show notes for our April 17, 2025, webinar, “Mastering Row-Level Security (RLS) in Bold BI®: Secure Multitenant Data Access for Authenticated and Anonymous Users.” The webinar was presented and hosted by Rajendran S P, assistant general manager at Bold BI®. If you missed the webinar or would like to watch it again, you can do so on our YouTube channel or in the following embedded player.

Overview

In this in-depth webinar, Rajendran S P walks through implementing row-level security (RLS) in Bold BI® to deliver scalable, secure, and highly personalized dashboards, especially for multitenant applications. Whether you’re building dashboards for internal users or external customers, this session breaks down the best ways to control who sees what and how to make your dashboards dynamically serve multiple audiences.

Topics

  • What is row-level security (RLS)? Understand how RLS allows each user to view only the data they’re authorized to see, removing the need to build separate dashboards for every user.
  • Single vs. multitenant environments: Learn how Bold BI® supports both single-tenant and multitenant architectures within a single dashboard design by using custom attributes and dynamic database switching.
  • RLS for authenticated and anonymous users: Discover how to apply user filters and group permissions for both registered users and guest access, ensuring secure, seamless user experiences.
  • Live demos of manual and lookup-table-based RLS: See RLS in action, from building dashboards from scratch to configuring filters with Excel-based lookup tables for easy maintenance and scalability.
  • Embedding dashboards with security: Learn to embed dashboards in apps by using secure embed settings in Bold BI®, which support both authenticated user access and anonymous embedding with custom filters and group rules.
  • Tracking with usage analytics: Gain insight into how dashboards are being used by consulting, built-in usage analytics in Bold BI®, making auditing and compliance effortless.

Best practices

  • Store embed secrets securely on the server side.
  • Use HTTPS for all embed communications.
  • Leverage custom attributes for tenant isolation.
  • Choose anonymous access for external-facing dashboards.
  • Regularly review the Usage Analytics dashboard.

Conclusion

Whether you’re building SaaS products or BI solutions for internal departments, Bold BI® empowers you to build once and deploy everywhere securely.

Recommended resources (related links):

Be the first to get updates

Carter Harris

Meet the Author

Carter Harris

Carter is the Video Marketing Specialist at Syncfusion. He is in charge of managing the Syncfusion YouTube channel as well as webinars produced through Syncfusion.