Summary

In this chapter, we have explained the topic of IBM Cognos security explaining the concepts of authentication, authorization, and the IBM Cognos 8 namespace.

The second half of the chapter briefly recapped how to gain access to perform the operation in the Contributor.

Administration console can be configured. We finished with a recap on how a contributor application can be secured.

Get IBM Cognos 8 Planning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.