O'Reilly logo

IBM Cognos BI v10.2 Administration Essentials by Khalid Mehmood Awan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Securing IBM Cognos BI

Every professional application must have stable and easy-to-implement security features. An environment must be reliable wherein every user is free of worries about security. IBM Cognos BI provides an environment that is trustable. By the end of this chapter, you should be able to secure the IBM Cognos BI environment, recognize security policies, define authentication and authorization in Cognos, and identify the Cognos BI security model. To do this, we will discuss the following topics in detail:

  • Security architecture
  • Managing authentication providers
  • Overcoming the initial security
  • Permissions management
  • Secured features, functionalities, and capabilities
  • Cognos firewall and logging
  • Single Sign-on (SSO)

The following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required