In this chapter, we have explained the topic of IBM Cognos security explaining the concepts of authentication, authorization, and the IBM Cognos 8 namespace.

The second half of the chapter briefly recapped how to gain access to perform the operation in the Contributor.

Administration console can be configured. We finished with a recap on how a contributor application can be secured.

Get IBM Cognos 8 Planning now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.