O'Reilly logo

IBM Cognos Business Intelligence v10: The Complete Guide by Sangeeta Gautam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Securing IBM Cognos BI Environment and Its Objects

The IBM Cognos BI security model is based on the industry-standard approach used to secure web applications.

Although you should secure your IBM Cognos BI environment, it is not mandatory. After you install the IBM Cognos software in your environment, you can start using the various studios to develop your reports.

Some factors that play an important role in security design and planning are factors such as who will use your IBM Cognos BI application? Is it only internal to the department or organization (within the organization’s firewall)? Are there any users outside your organization? Are any portions of application available to the public for which a login is not required? The ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required