An administrator needs to setup security for a newly installed environment.
Which of the following is a valid step?
You may not want all users that exist in an authentication source to have access to IBM Cognos software. To secure IBM Cognos software, configure the product so that only users who belong to a specific group or role in your authentication source, or in the Cognos namespace, are allowed access.
We recommend using the Cognos namespace because it contains preconfigured groups and roles that help you to secure IBM Cognos software quickly. One of the preconfigured groups is Everyone.
By default, the group Everyone belongs to several built-in groups and roles in the Cognos namespace.
If you decide to use the Cognos namespace, you must remove the Everyone group from all built-in groups and roles and replace it with groups, roles, or users authorized to access IBM Cognos software.
References: IBM Cognos Administration Version 10.1.0, Administration and Security Guide, page 64
An administrator is checking the current activities and recognizes one activity with several successful tasks with two still running. The administrator cancels this activity.
Where will this activity be shown?
Note: Users can access Current Activities, Past Activities, Upcoming Activities and Schedules on the Status tab in IBM Cognos Administration to monitor the server activities and manage schedules.
An administrator needs to setup security for a newly installed environment.
Which of the following is a valid step?
You may not want all users that exist in an authentication source to have access to IBM Cognos software. To secure IBM Cognos software, configure the product so that only users who belong to a specific group or role in your authentication source, or in the Cognos namespace, are allowed access.
We recommend using the Cognos namespace because it contains preconfigured groups and roles that help you to secure IBM Cognos software quickly. One of the preconfigured groups is Everyone.
By default, the group Everyone belongs to several built-in groups and roles in the Cognos namespace.
If you decide to use the Cognos namespace, you must remove the Everyone group from all built-in groups and roles and replace it with groups, roles, or users authorized to access IBM Cognos software.
References: IBM Cognos Administration Version 10.1.0, Administration and Security Guide, page 64
An administrator is checking the current activities and recognizes one activity with several successful tasks with two still running. The administrator cancels this activity.
Where will this activity be shown?
Note: Users can access Current Activities, Past Activities, Upcoming Activities and Schedules on the Status tab in IBM Cognos Administration to monitor the server activities and manage schedules.
An administrator needs to setup security for a newly installed environment.
Which of the following is a valid step?
You may not want all users that exist in an authentication source to have access to IBM Cognos software. To secure IBM Cognos software, configure the product so that only users who belong to a specific group or role in your authentication source, or in the Cognos namespace, are allowed access.
We recommend using the Cognos namespace because it contains preconfigured groups and roles that help you to secure IBM Cognos software quickly. One of the preconfigured groups is Everyone.
By default, the group Everyone belongs to several built-in groups and roles in the Cognos namespace.
If you decide to use the Cognos namespace, you must remove the Everyone group from all built-in groups and roles and replace it with groups, roles, or users authorized to access IBM Cognos software.
References: IBM Cognos Administration Version 10.1.0, Administration and Security Guide, page 64
Submit Cancel