Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
IBM Cognos Business Intelligence

You're reading from   IBM Cognos Business Intelligence Discover the practical approach to BI with IBM Cognos Business Intelligence

Arrow left icon
Product type Paperback
Published in May 2013
Publisher Packt
ISBN-13 9781849683562
Length 318 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Dustin Adkison Dustin Adkison
Author Profile Icon Dustin Adkison
Dustin Adkison
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

IBM Cognos Business Intelligence
Credits
Foreword
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface
1. IBM Cognos Connection 2. Introducing IBM Cognos Workspace FREE CHAPTER 3. IBM Cognos Active Reports 4. IBM Cognos Mobile 5. IBM Cognos Query Studio 6. IBM Cognos Analysis Studio 7. IBM Cognos Workspace Advanced 8. IBM Cognos Report Studio 9. IBM Cognos Framework Manager 10. Administration and Performance Tuning 11. Streamlining Common Administrator Tasks 12. User Adoption Index

Designing your security model


Understanding how Cognos BI security works and setting up the proper security is essential in any reporting environment for information that needs to be protected. The need to protect data can be based on how sensitive the data is to your stakeholders, or it could be governed by laws and regulations such as we see with healthcare and financial information. To understand how Cognos BI security all ties together, we will start by looking at an overview of the various pieces of Cognos BI security.

The CAF

The Cognos Application Firewall (CAF) can be turned on inside of Cognos Configuration. You simply set Enable CAF validation? to True and restart your environment:

The CAF will protect your environment from outside attacks. It is a very good idea to leave the CAF turned on with outward-facing environments that are not secured heavily by other means.

The only major drawback of the CAF being turned on is that it limits use by external applications to Cognos BI. Because...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime