O'Reilly logo

IBM Cognos 8 Planning by Rich Babaran, Ned Riaz, Jason Edwards

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the application data

You have created the application, imported the e.List and rights, and now the application is ready for users. However, you determine that you do not want to show a specific cube, or you want to make a range of cells Read Only in your application due to a data security issue. You will use Access Tables to secure data access in IBM Cognos Planning.

Understanding access tables

You, as an administrator, create Access Tables to determine the level of access users should have to the application's cubes and dimension items in a cube.

IBM Cognos Planning provides four types of access levels to secure the data access: Write, Read, Hidden, and No Data access. You can secure the data access for all of the planning nodes, or a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required