When you set access permissions, you can reference both
authentication provider users, groups, and roles and Cognos groups
and roles. However, if you plan to deploy your application in the
future, we recommend that you use only the Cognos groups and roles
to set up access to entries in IBM Cognos 8 to simplify
the process .
You can grant or deny the following access permissions.
Permissions | Icons | Permitted Actions |
Read | | View all the properties of an entry, including the report specification, report output, and so on, which are properties of a report. Create a shortcut to an entry. |
Write | | Modify properties of an entry. Delete an entry. Create entries in a container, such as a package or a folder. Modify the report specification for reports created in Report Studio and Query Studio. Create new outputs for a report. |
Execute | | Process an entry.
Note: Users must have execute permissions for the account they use with the run as the owner report option. |
Set policy | | Read and modify the security settings for an entry. |
Traverse | | View the contents of a container entry, such as a package or a folder, and view general properties of the container itself without full access to the content. Note: Users can view the general properties of the entries for which they have any type of access. The general properties include name, description, creation date, and so on, which are common to all entries. |
Action | Permissions required |
Add an entry | Write permissions for a parent entry |
Query the entry properties | Read permissions for an entry |
View the children of the entry | Traverse permissions for an entry |
Update an entry | Write permissions for an entry |
Delete an entry | Write permissions for an entry, and write permissions for a parent entry |
Copy an entry | Read permissions for an entry and any child entries, traverse permissions for all of the children, and write and traverse permissions for the target parent entry |
Move an entry | Read and write permissions for an entry, write permissions for both the source parent entry and the target parent entry, and traverse permissions for the target parent entry |