Security & Data Handling

Your data never leaves your infrastructure.

Yurbi runs on your servers, connects to your databases, and operates entirely inside your environment. We designed it this way from day one — so there's nothing for us to breach, leak, or mishandle.

The Self-Hosted Model

Nothing passes through our hands.

In a cloud BI product, your data flows through a vendor's infrastructure. You're trusting their security posture, their employee access controls, their uptime.

Yurbi works differently. You install it on your own server — Windows, Linux, or Docker. It connects directly to your databases. Yurbi only stores configuration and report metadata. Your actual data is queried at runtime and never retained.

  • Yurbi never copies or caches your database records
  • No outbound connections to 5000fish servers required
  • Deploy behind your firewall or fully air-gapped
  • Read-only database credentials — Yurbi cannot write to your data
Your App + Your Users
Yurbi Running on your server
Your Database SQL Server · PostgreSQL
Layer 01 — Authentication

You choose how users log in.

Yurbi supports five authentication methods — from simple passwords to enterprise SSO. Mix and match across your user base.

PIN / Password

Standard Yurbi-managed credentials. Password stored securely. Best for installations not in an Active Directory domain.

Windows / Active Directory

When the Yurbi server is domain-joined, selecting Windows authentication routes login through your local server — and therefore your AD. No separate LDAP configuration required.

Cisco DUO 2FA

Enable two-factor authentication via Cisco DUO directly from Server Settings. Adds a second verification step on top of any primary auth method.

Header-Rewrite SSO

Enable SSO in Server Settings, define the header field name, and any request reaching sso.html that carries the correct header — rewritten by tools like BMC SSO, CA Siteminder, or Azure — will authenticate the user automatically. No additional integration code required on the Yurbi side.

API Session Token — Seamless Embedded Login

For ISVs embedding Yurbi inside their product, the DoLogin API generates a session token that authenticates your user silently — no login screen, no redirect. Pass the token in the embed URL and your customer lands directly on their analytics.

The session token is scoped to that user's permissions. Even with the token, a user can only access dashboards and reports their Yurbi account is authorized to see. Full embedding guide →
Layer 02 — Access Control

Tenant Mode: complete isolation for multi-tenant deployments.

When multiple customers share a single Yurbi installation, Tenant Mode ensures each tenant sees only their own groups, reports, and contacts — nothing bleeds across.

Without Tenant Mode
  • Security groups All groups visible — Customer A can see Customer B's group names
  • "All Users" group Shown by default — a group that spans all tenants
  • Scheduled report contacts Full contact list exposed when scheduling reports
With Tenant Mode enabled
  • Security groups Filtered to only the groups a user belongs to — other tenants invisible
  • "All Users" group Removed from all tenant-facing lists
  • Scheduled report contacts Limited to contacts belonging to the user's own groups only

Tenant Mode toggle — Settings → Server Settings

Screenshot A: Server Settings — Tenant Mode toggle
Layer 03 — Roles & Permissions

Every user has exactly the access they need.

Four roles control what a user can do — not just what they can see. Assigned per data source, so the same user can build in one app and only view in another.

Agent
View & consume
Builder
Build & compose
Architect
Design the data model
Admin
Full platform control
View dashboards & reports
Schedule & export reports
Build & edit reports
Create dashboards
Design the Yurbi App (semantic layer)
Configure App Shield policies
Manage users, groups, permissions
Server settings, audit config, integrations
Roles are per-app, not global. A user can be an Agent in your customer-facing reporting app while being a Builder in an internal ops app — with different App Shield policies applied to each.

Permissions assignment — assigning a role to a user per data source

Screenshot D: Permissions screen — user assigned to role
Layer 04 — App Shield

Data-level security. Set once, enforced everywhere.

App Shield is Yurbi's field-level security system. It applies constraints directly at query time — so users only receive the rows they're authorized to see, regardless of how they access the data.

One policy protects everything. App Shield constraints apply to dashboard views, report runs, scheduled emails, exports, and embedded content — without any per-report configuration.
Step 1

Define the policy

Name the policy, select the data source and report types it applies to, then define field constraints — such as limiting by CustomerID, Region, or a date window like "last 90 days."

Virtual field constraints work on calculated values too — not just raw database columns. No schema changes required.

Step 2

Assign to groups or users

Attach the policy to one or more security groups. Users in that group automatically receive the data restrictions — no per-report assignment needed.

Policies can overlap: a user in multiple groups gets the cumulative constraints of all applicable policies.

Step 3

Applied at query time — automatically

When a user runs a report, Yurbi embeds the policy constraints directly into the SQL query. Only the permitted rows are fetched from the database — not filtered after the fact.

This means there's no back door. Even if a user somehow accesses a report directly, the data restriction is enforced at the database call.

App Shield — policy list with on/off toggles

Screenshot B: App Shield policy list with on/off toggles

App Shield — constraint builder

Screenshot C: App Shield constraint builder
Platform Controls

Additional safeguards built into the platform.

Max Records Cap

Set a platform-wide limit on how many rows any query can return. Protects your database from runaway queries when users forget to apply date or category filters. Configurable in Settings → Server Settings.

Screenshot E: Server Settings — Max Records + DUO fields

Audit Logging

Track logins, login failures, report creation, edits, deletions, group changes, and more. Configurable retention periods. Stored inside your Yurbi installation database — never sent externally.

Screenshot F: Audit Options — categories and retention

Guest View Licenses

Share specific reports publicly — or embed them in portals like SharePoint — without requiring a Yurbi login. Guest licenses are scoped per report and fully auditable. App Shield does not apply to guest views by design.

Your Perimeter

Network, OS, and firewall — that's your territory.

Because Yurbi runs inside your infrastructure, the perimeter security controls — firewall rules, OS hardening, network segmentation, TLS configuration, patching cadence — are entirely in your hands.

This is the model enterprise security teams prefer. You're not trusting a vendor's infrastructure posture. You're applying your own standards, your own tools, and your own audit trail.

Implementation Guide →
Deploy on-prem, private cloud, or hybrid
Air-gap capable — no required outbound connections
TLS, patching, OS hardening — your standards apply
Read-only DB credentials — Yurbi cannot modify your data
FAQ

Common security questions.

Get your dev team back on your product.

See how Yurbi embeds into your product, or download the trial and run it on your own servers today. No consultants required. No six-figure minimums.

  • Multi-tenant security
  • Full white-label
  • Embedding API
  • Data stays on your servers
Download Free Trial See a Live Demo

Full feature access · Windows & Linux · No credit card required

Talk to the team →