27
IBM Software W or kshop 8 Securing IBM Cognos Contents Security for Contents in IBM Cognos When dealing with security in IBM Cognos, we are referring to the external 3 rd party secu rity provider that you may be using. IBM Cognos also provide Cognos Namespac e which contains the groups and roles that we have created for you if you choose to use them. In this workshop, we will see how to secure content by defining security in Framework Manager, where we have the ability to control access to an object, a package or data. Workshop Objectives In this workshop, you will know to secure contents of IBM Cognos: Setup object security Setup package security Setup data security. Workshop 8 Securing IBM Cognos Contents Page 101

10_Securing IBM Cognos Contents

Embed Size (px)

Citation preview

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 1/27

IBM Software

Workshop 8 Securing IBM Cognos Contents

Security for Contents in IBM Cognos

When dealing with security in IBM Cognos, we are referring to the external 3 rd party securityprovider that you may be using.IBM Cognos also provide Cognos Namespace which contains the groups and roles that we havecreated for you if you choose to use them.

In this workshop, we will see how to secure content by defining security in Framework Manager, wherewe have the ability to control access to an object, a package or data.

Workshop Objectives

In this workshop, you will know to secure contents of IBM Cognos:

● Setup object security

● Setup package security

● Setup data security.

Workshop 8 – Securing IBM Cognos Contents Page 101

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 2/27

IBM Software

8.1 Package and Object Security

 __1. Open Framework Manager by going to Start > IBM Cognos > IBM Cognos FrameworkManager .

 __2. Open great_outdoors_warehouse from “C:\ProgramFiles\ibm\cognos\c10_64\webcontent\samples\models\great_outdoors_warehouse”.

Page 102 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 3/27

IBM Software

 __3.

 __4. Expand go_data_warehouse namespace.

We will secure HR data so only specific users that can use this data in reporting and analysis.

 __5. First we will find out what data is in HR (analysis) then we will assign specific users to it.

For example, we will secure Employee expense.

Workshop 8 – Securing IBM Cognos Contents Page 103

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 4/27

IBM Software

 __6.

 __7. Expand Employee expense.

We will assign specific users to the above dimensions and fact

 __8. Right click Employee expense fact, click Go to Target

Page 104 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 5/27

IBM Software

 __9. Click Employee expense fact, then from Action menu (top): click Specify Object Security.

 __10. Specify Object Security window appears. We will add users to this.

Click Add.

Workshop 8 – Securing IBM Cognos Contents Page 105

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 6/27

IBM Software

 __11. In Select Users and Groups windows, scroll down on Available entries (left box), tick oncheckbox of Erica Exec Group (user groups) and Dennis Michaels (user).

 __12. Click green arrow to put them in the right box (Selected entries) and click OK.

Page 106 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 7/27

IBM Software

 __13. Back in the Specify Object Security, tick check box under Allow.

This means that we will allow Dennis Michaels and Erica Exec Group to see this object.

We will not allow Everyone (else).

 __14. A warning will appear, click OK to confirm securing this object.

Workshop 8 – Securing IBM Cognos Contents Page 107

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 8/27

IBM Software

 __15. Notice now there is a change in the icon of Employee expense fact, meaning that this objecthas security applied for specific users.

 __16. Next we will apply the security to the dimensions:

But we will tick on Everyone checkbox, to allow any other users to access for these dimension:Time, YTD Time.

These 2 time dimensions are not specific to HR divisions. They are needed for other users onother analysis.

Page 108 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 9/27

IBM Software

 __17. Hold Ctrl key and click these dimensions, then click Action – Specify Object Security, tickcheck box under Allow for the users.

 __18. Hold Ctrl key and click Time and YTD Time dimensions, then click Action – Specify ObjectSecurity, tick check box under Allow for Everyone.

Workshop 8 – Securing IBM Cognos Contents Page 109

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 10/27

IBM Software

 __19. Do the same for HR (analysis), leave Everyone unchecked.

 __20. Next step is to create a new package for this HR data, for example by copying existing package“Go Data Warehouse (analysis).

Page 110 Experience Business Intelligence with IBM Cognos 10

Note:We create a new pacto show package sec

If we re-publish theexisting packages, thany other user can u

 package other than H(analysis), by definin Allow for Everyoneother dimensions anmeasures.

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 11/27

IBM Software

 __21. Paste the copied package

 __22. Rename the copied package to HR GO Data Warehouse (analysis)

Workshop 8 – Securing IBM Cognos Contents Page 111

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 12/27

IBM Software

 __23. Right click the package, click Edit Definition

 __24. Uncheck Sales and Marketing (analysis) and Finance (analysis) as shown, then click OK:

Page 112 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 13/27

IBM Software

 __25. Publich the package

 __26. Click Next

Workshop 8 – Securing IBM Cognos Contents Page 113

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 14/27

IBM Software

 __27. On this window, click Add.

 __28. Do same steps as in point 9 – 10, the result will be as shown below.

Page 114 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 15/27

IBM Software

Click Next.

 __29. Click Publish.

 __30. If no error found:

Workshop 8 – Securing IBM Cognos Contents Page 115

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 16/27

IBM Software

Click Finisih. Leave the model open for the next session.

 __31. We will test if the users can use the data.

Launch IBM Cognos, login as Erica Exec, click Authos Business Report.

 __32. Choose the new package HR GO Data Warehouse (analysis).

Page 116 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 17/27

IBM Software

 __33. Create New

 __34. Select Chart then click OK.

Workshop 8 – Securing IBM Cognos Contents Page 117

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 18/27

IBM Software

 __35. For example, we choose Pie, Donut with form of Exploded Donut with 3-D…

 __36. For example, we can put Expense Total in Default Measure and Employee by Region inSeries (pie slices):

Page 118 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 19/27

IBM Software

 __37. Let’s login as different user, for example: Fred Analyst.

 __38. Logoff and login again as Fred Analyst.

 __39. Choose Query my Data

 __40. Since Fred is not registered to use the package, he cannot see the contents.

Workshop 8 – Securing IBM Cognos Contents Page 119

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 20/27

IBM Software

 __41. Quiz: how can Fred able to see these contents?

Page 120 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 21/27

IBM Software

8.2 Data Security

 __1. It’s also possible to restrict part or all of the data that a particular Query Subject returns to a user or group of users by applying a security filter on the Query Subject in Framework Manager.

Note: Please setup groups users as follows in Computer Management

Workshop 8 – Securing IBM Cognos Contents Page 121

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 22/27

IBM Software

 __2. Still using the same model as in module 8.1, locate Employee by Region.

On Tool pane, click Search tab, type in Employee by Region, in Scope – choose Class of Query Subject.

We will apply data security on this query subject so a user can only see the data of his region.

 __3. Click Employee by Region query subject (on Project Viewer ), click Action – Specify DataSecurity

Page 122 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 23/27

IBM Software

 __4. Click Add Groups on Specify Data Security window.

 __5. Add some groups per regions, i.e Asia, Europe and North America

Workshop 8 – Securing IBM Cognos Contents Page 123

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 24/27

IBM Software

 __6. Click OK then apply the filter for each region accordingly.

 __7. For Europe group, create filter by Insert From Model, choose the region, i.e Central Europe.

Page 124 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 25/27

IBM Software

 __8. Same steps, apply filters for Asia and North America.

 __9. Publish the package HR GO Data Warehouse (analysis).

 __10. Login as Dennis Michaels, we can only see data per his region (America)

Workshop 8 – Securing IBM Cognos Contents Page 125

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 26/27

IBM Software

 __11. Login as Erica Exec.

Page 126 Experience Business Intelligence with IBM Cognos 10

7/28/2019 10_Securing IBM Cognos Contents

http://slidepdf.com/reader/full/10securing-ibm-cognos-contents 27/27

IBM Software

8.3 Summary

In this workshop, we setup different level of security in Framework Manager model:

●  Apply security for accessing packages

●  Apply security for objects

●  Apply security by filtering data

● Publish the secured package

● Test the security scenario by login as different users