19
CHAPTER
Security
Having consulted with a large number of customers since the initial release of IBM Cognos Business Intelligence v10.1, we have found that security implementations tend to fall into one of two categories: not enough or too much. Not enough security occurs when the IBM Cognos 10 default settings are left in place and security is relegated to the user logon, or when no security is implemented at all. The danger here is obvious: Anyone with access to IBM Cognos Connection can view or print any information that has been published. They can also delete any objects they find, such as reports, folders, and packages. Too much security occurs when either the system administrator does not understand the flexibility of Cognos 10 security, ...

Get IBM Cognos Business Intelligence 10: The Official Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.