TM1 version 9 introduced the concept of cell-level security, allowing users to secure individual cells without the need for a complicated matrix of element-level security cubes. Cell-level security can quickly become cumbersome, as each cell within a cube requires its own security setting. This article demonstrates how to use rules and a custom security cube [...]
During the course of an IBM Cognos environment’s lifespan, there may be times when you will need to configure IBM Cognos to allow users to connect to more than one third party authentication source from the same Cognos portal. This can happen in several scenarios.
Introduction When faced with the challenge of creating and securing custom views in Transformer models (and their resultant PowerPlay cubes), one can easily perform the necessary steps via the Transformer GUI. However, when the number of custom views to be created and secured is large, it often makes sense to perform this task by using [...]
One of the most challenging aspects of establishing any enterprise business intelligence platform is the design and implementation of a security model that is flexible and extensible enough to meet the needs of your business while also remaining simple enough to administer and maintain. Every organization is unique in how they operate, so a structure [...]