Configuring Item-Level Security
After granting access to the report server content, you then configure security to control which items each user can see and open. If a user’s role does not permit access to an item, the item is not visible to the user. Similarly, if the user cannot perform a certain task, the user interface does not include the option or buttons required to perform that task. Because security is inherited from the parent folder, you change the security settings only for those items requiring a different role assignment than the one configured for the upper-level folder.
Note
Many of the steps described in the procedures in the following ...
Get Microsoft® SQL Server® 2008 Reporting Services Step by Step now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.