Configuring Item-Level Security
After granting access to the report server content, you then configure security to control which items each user can see and open. If a user’s role does not permit access to an item, the item is not visible to the user. Similarly, if the user cannot perform a certain task, the user interface does not include the option or buttons required to perform that task. Because security is inherited from the parent folder, you change the security settings only for those items requiring a different role assignment than the one configured for the upper-level folder.
Many of the steps described in the procedures in the following ...