The IBM Cognos BI Security architecture involves authentication, authorization, encryption, certificates, and of course, administration. Every area focuses on its unique subject, for example, encryption deals with encrypting the data that flows between different machines. Both encryption and decryption algorithms are selected and implemented when Cognos is started on the Content Manager machine. The following diagram shows the architecture of security in IBM Cognos BI:
To manage users in IBM Cognos BI, it must be linked with a third-party authentication provider. An authentication provider defines users, groups, and privileges/roles. Authentication providers store the basic information of a user, for example, username, password, e-mail ID, preferences, and group settings. Once an authentication provider is linked with the IBM Cognos BI environment, the entries of authentication providers and their basic information can...