Configuring Item-Level Security

After granting access to the report server content, you then configure security to control which items each user can see and open. If a user’s role does not permit access to an item, the item is not visible to the user. Similarly, if the user cannot perform a certain task, the user interface does not include the option or buttons required to perform that task. Because security is inherited from the parent folder, you change the security settings only for those items requiring a different role assignment than the one configured for the upper-level folder.



Many of the steps described in the procedures in the following ...

Get Microsoft® SQL Server® 2008 Reporting Services Step by Step now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.