O'Reilly logo

IBM Cognos 8 Business Intelligence: The Official Guide by Dan Volitich

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

17
CHAPTER
Security
Having consulted with a large number of customers since the release of Cognos 8, we have found that security implementations tend to fall into one of two categories: not enough or too much. Not enough security occurs when the Cognos 8 default settings are left in place and security is relegated to the user logon or no security at all. The danger here is obvious: anyone with access to Cognos Connection can view or print any information that has been published. They can also delete any objects they find, such as reports, folders, and packages. Too much security occurs when the system administrator either does not understand the flexibility of Cognos 8 security, or, to be frank, the system administrator is paranoid. In this case, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required