In this section, we will look at how users access IBM Cognos Planning through authentication and gain access to IBM Cognos Planning resources through authorization. We'll also explore how users, groups, and roles fit in with IBM Cognos Planning security. Finally, we will briefly look at the IBM Cognos Planning 8 namespace.
Let's look at how authentication and authorization fits in with IBM Cognos Planning security.
By default, when security is not configured in IBM Cognos Planning, anyone can access the system. Alternatively, IBM Cognos Security can be configured to use a third party authentication provider to validate user logins by adding the third party authentication provider as a namespace.
When you log in to a network, you must provide a username and password. Your user name and password, also known as your login credentials, are stored in an authentication provider. The authentication provider will...