Security Model
The security model can be easily integrated with the existing security
infrastructure in your organization. It is built on top of one or
more authentication providers. You use the providers
to define and maintain users, groups, and roles, and to control the
authentication process. Each authentication provider known to IBM Cognos software
is referred to as a namespace .
In addition to the namespaces that represent the authentication providers, IBM Cognos software has a built-in namespace named Cognos . The Cognos namespace enhances your organization security policies and deployment ability of applications.
Security in IBM Cognos software is optional. If security is not enabled it means that no authentication providers are configured, and therefore all user access is anonymous. Typically, anonymous users have limited, read-only access.
Security documentation in Cognos Proven Practices
The IBM Cognos Business Intelligence Administration and Security Guide provides only basic information about a generic security implementation in IBM Cognos Business Intelligence. If you need information about specific implementations, using different security providers, you can use the resources available in IBM Cognos Proven Practices (http://www.ibm.com/developerworks/data/library/cognos/cognosprovenpractices.html). Click the Security link in the page, and follow the links to different types of articles about security.