1. Chapter 1: Authentication Providers
    1. A Full Authentication Provider
    2. A Trusted Signon Provider
  2. Chapter 2: Developing a Custom Authentication Provider
    1. 1. Planning Your Implementation
      1. 1.1
        1. Create a flow diagram that represents a high level view of the authentication process and identifies the entry points to IBM Cognos 8.
      2. 1.2
        1. Determine how to authenticate users
      3. 1.3
        1. Consider the objects you must use in your provider
      4. 1.4
        1. Consider any objects, such as accounts or groups, and their properties, that you cannot store in your authentication source
      5. 1.5
        1. Initialize your authentication source
      6. 1.6
        1. Create a manifest for the jar file
    2. 2. Defining User Authentication Methods
      1. 2.1 Authentication Requests: Flow Scenarios
        1. 2.1.1 The identification information objects
          1. Object
          2. Description
          3. Form fields
          4. HTML form elements used for data input, such as a user name and password, from a Web page.
          5. Credentials
          6. Identification information, typically a user ID and password, provided by the IBM Cognos 8 SDK program logon method or by Content Manager to run scheduled reports and jobs.
          7. Cookies
          8. The cookie values store the information from the browser session
          9. Environment variables
          10. The environment variable values store the information from the entry point gateway.
          11. Trusted environment variables
          12. The environment variable values signed by the entry point gateway.
        2. 2.1.2 The following diagram shows the flow of an authentication request.
        3. 2.1.3 Scenario 1: Processing Requests That Contain All Required Logon Information
        4. 2.1.4 Scenario 2: Processing Requests When Input From a User Is Required
        5. 2.1.5 Scenario 3: Processing Requests When Input From the System Is Required
        6. 2.1.6 Handling an Unrecoverable Error
          1. User interface object
          2. Description
          3. Caption
          4. Displays the text to the user, for example, to identify an error condition.
          5. Message
          6. Shows error details. Authentication services logs the message data to the IBM Cognos 8 Indication Processing Facility (IPF).
          7. ReadOnlyDisplayObject
          8. Shows the context information. For example, it can be a prompt that says: "Enter the password for smithj."
          9. HiddenDisplayObject
          10. Maintains context information across multiple requests.
          11. TextDisplayObject
          12. A regular input text box for a user name and other unsecured data.
          13. SingleSelectDisplayObject
          14. A drop-down list with one selection possible.
          15. MultiSelectDisplayObject
          16. A drop-down list with multiple selections possible.
          17. VerifyTextNoEchoDisplayObject
          18. An input text box used for a password change verification.
          19. TextNoEchoDisplayObject
          20. Echoes for entered text, such as "*". Use for passwords and other secure data.
      2. 2.2 Implementing the User Authentication Interfaces
        1. 2.2.1 INamespaceAuthenticationProvider2 Interface
        2. 2.2.2 IVisa Interface
    3. 3. Defining Namespace Searches