Every professional application must have stable and easy-to-implement security features. An environment must be reliable wherein every user is free of worries about security. IBM Cognos BI provides an environment that is trustable. By the end of this chapter, you should be able to secure the IBM Cognos BI environment, recognize security policies, define authentication and authorization in Cognos, and identify the Cognos BI security model. To do this, we will discuss the following topics in detail:
Security architecture
Managing authentication providers
Overcoming the initial security
Permissions management
Secured features, functionalities, and capabilities
Cognos firewall and logging
Single Sign-on (SSO)
The following screenshot shows the area we will be focusing on in this chapter. The Security tab is highlighted.