Write, Bureaucrats, Administrators
3,572
edits
Line 14: | Line 14: | ||
This is the recommended approach. | This is the recommended approach. | ||
It allows you to monitor who is accessing data and when. It also ensures that | It allows you to monitor who is accessing data and when. It also ensures that the client will not be useable/refreshable without these credentials. | ||
Note that Microsoft Excel and Microsoft Power BI Desktop do not store the credentials with the actual file. This is to ensure that no one can obtain a copy of the file and use it without knowing the credentials. | Note that Microsoft Excel and Microsoft Power BI Desktop do not store the credentials with the actual file. This is to ensure that no one can obtain a copy of the file and use it without knowing the credentials. |