Configuring Item-Level Security

After granting access to the report server content, you then configure security to control which items each user can see and open. If a user’s role does not permit access to an item, the item is not visible to the user. Similarly, if the user cannot perform a certain task, the user interface does not include the option or buttons required to perform that task. Because security is inherited from the parent folder, you change the security settings only for those items requiring a different role assignment than the one configured for the upper-level folder.

Note

Note

Many of the steps described in the procedures in the following ...

Get Microsoft® SQL Server® 2008 Reporting Services Step by Step now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.