Restricting Access to IBM Cognos Software

You may not want all users that exist in an authentication source to have access to IBM® Cognos® software.

To secure IBM Cognos software, configure the product so that only users who belong to a specific group or role in your authentication source, or in the Cognos namespace, are allowed access.

We recommend using the Cognos namespace because it contains pre-configured groups and roles that help you to secure IBM Cognos software quickly. One of the pre-configured groups is Everyone. By default, the group Everyone belongs to several built-in groups and roles in the Cognos namespace. If you decide to use the Cognos namespace, you must remove the Everyone group from all built-in groups and roles and replace it with groups, roles, or users authorized to access IBM Cognos software.

To restrict access to IBM Cognos software, do the following:

For more information about the security concepts implemented in IBM Cognos software, see Security Model.