17
CHAPTER
Security
Having consulted with a large number of customers since the release of Cognos 8, we have found that security implementations tend to fall into one of two categories: not enough or too much. Not enough security occurs when the Cognos 8 default settings are left in place and security is relegated to the user logon or no security at all. The danger here is obvious: anyone with access to Cognos Connection can view or print any information that has been published. They can also delete any objects they find, such as reports, folders, and packages. Too much security occurs when the system administrator either does not understand the flexibility of Cognos 8 security, or, to be frank, the system administrator is paranoid. In this case, ...

Get IBM Cognos 8 Business Intelligence: The Official Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.