Chapter 16. Maintaining Security

This chapter summarizes the area of IBM Cognos Planning security. Much of the subject of Analyst and Contributor security has been covered in depth in Chapters 14 and 15, respectively.

We begin this chapter with an overview of IBM Cognos Planning security explaining the following security concepts and areas:

  • Authentication and authorization
  • Users, groups, and roles
  • IBM Cognos namespace

The second half of this chapter recapitulates how security is configured in Analyst and Contributor.

Overview of security in IBM Cognos Planning

In this section, we will look at how users access IBM Cognos Planning through authentication and gain access to IBM Cognos Planning resources through authorization. We'll also explore how users, ...

Get IBM Cognos 8 Planning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.