19
CHAPTER
Security
Having consulted with a large number of customers since the initial release of IBM Cognos Business Intelligence v10.1, we have found that security implementations tend to fall into one of two categories: not enough or too much. Not enough security occurs when the IBM Cognos 10 default settings are left in place and security is relegated to the user logon, or when no security is implemented at all. The danger here is obvious: Anyone with access to IBM Cognos Connection can view or print any information that has been published. They can also delete any objects they find, such as reports, folders, and packages. Too much security occurs when either the system administrator does not understand the flexibility of Cognos 10 security, ...

Get IBM Cognos Business Intelligence 10: The Official Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.