Chapter 12. Securing IBM Cognos BI Environment and Its Objects

The IBM Cognos BI security model is based on the industry-standard approach used to secure web applications.

Although you should secure your IBM Cognos BI environment, it is not mandatory. After you install the IBM Cognos software in your environment, you can start using the various studios to develop your reports.

Some factors that play an important role in security design and planning are factors such as who will use your IBM Cognos BI application? Is it only internal to the department or organization (within the organization’s firewall)? Are there any users outside your organization? Are any portions of application available to the public for which a login is not required? The ...

Get IBM Cognos Business Intelligence v10: The Complete Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.