How to implement CJAP security

Follow the procedures in this section in the order shown to implement CJAP security.

Before you begin to perform the implementation procedures, read this section to understand some special considerations that might apply to your environment.

Authenticated mode

When you configure the IBM® EMM Authentication Provider, you can set the value of the Authentication Mode property by selecting either authenticated or authenticatedPerUser.

If you selected authenticated, all users are authenticated using the same user account.

Note the following considerations when you use the authenticated option.

  • By default, the user account that the system uses for authentication is Cognos_admin. When you implement CJAP authentication, it is a best practice to give the Cognos_admin user the ReportUser role in IBM EMM.
  • You do not have to perform the following procedures described in this chapter. These procedures apply only when you select authenticatedPerUser for the IBM EMM Authentication Provider.
    • Giving all Reports users read-only permissions in public folders
    • Securing public folders
    • Verifying user permissions in Cognos