Summary
In this chapter, we have explained the topic of IBM Cognos security explaining the concepts of authentication, authorization, and the IBM Cognos 8 namespace.
The second half of the chapter briefly recapped how to gain access to perform the operation in the Contributor.
Administration console can be configured. We finished with a recap on how a contributor application can be secured.
Get IBM Cognos 8 Planning now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.