O'Reilly logo

IBM Cognos 8 Planning by Rich Babaran, Ned Riaz, Jason Edwards

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Managing security profiles

In this section, we will briefly recap how system administrators manage security to Analyst and Contributor. We will look at how administrators can grant access to Analyst users to specific objects such as D-Cubes or D-Lists. We will also explore briefly how system administrators grant access to other administrators to perform various functions in the Contributor Administration Console.

Analyst security

In some cases, the default security settings in Analyst may be sufficient. This may be the case where an environment may consist of a very small number of Analyst users. However, in an environment where there are many users accessing Analyst, it is typical to configure Analyst security to control which libraries these users ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required