Chapter 7. Adding Security
Cognos Transformer supports simultaneous user authentication and logon using
the full range of supported IBM Cognos security providers. You can also add
custom views to each PowerCube to grant or deny access to sensitive business
intelligence information. These access controls can be customized down to the
query object level: not merely to reports and cubes, but to the specific levels,
categories or members, and measures within them.
PowerCubes with IBM Cognos Series 7 Security
PowerCubes secured against an IBM Cognos Series 7 namespace can be built on
any IBM Cognos platform, including Linux and HPUX Itanium. However, the IBM
Cognos Content Manager component must be installed on a platform supported by
IBM Cognos Series 7 Version 4.
For an up-to-date list of supported environments, visit the IBM Cognos Customer
Center http://www.ibm.com/software/data/cognos/customercenter.
Choosing the Type of Security to be Applied
Cognos Transformer supports two types of security to restrict data access across
the IBM Cognos reporting components: member-based security and cube-based
password protection.
When you use member-based security, you create custom views and apply these
views to specific categories (members), dimensions, or components thereof. This
filters the cube data that is shown to specific report users. Member-based security
uses security objects such as users, groups, or roles, to define user access to
information.
With cube-based security, you apply security to an entire PowerCube or cube
group by setting a password to restrict access to authorized users.
Assessing Your Security Requirements
Use the following questions to assess the need to control access to information and
to identify the specific security levels to apply to each user, group, or role.
v
Can you place your users into distinct groups based on their information needs
and access privileges? Or, do people change jobs or locations so frequently that
this is not practical?
v
If your organization already has user groups or roles, are these based on
network and database access, or existing Human Resources classifications such
as job functions and task profiles? Will you need to realign these user groups to
more accurately reflect decision-making roles?
v
Can you rely on database or network operating system logins to restrict access,
or must you implement alternative security for your sensitive data? Do you have
directory-based security already in place?
After you decide on the necessary levels of security to use, the process of adding
security to your models and cubes consists of the following tasks:
© Copyright IBM Corp. 2007, 2011
147
Содержание Cognos
Страница 1: ...IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 106: ...92 IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 136: ...122 IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 160: ...146 IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 174: ...160 IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 326: ...312 IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 352: ...338 IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 394: ...380 IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 398: ...384 IBM Cognos Transformer Version 10 1 1 User Guide ...
Страница 411: ...Y year function 362 years between function 362 Index 397 ...