O'Reilly logo

Microsoft® SQL Server® 2008 Reporting Services Step by Step by Stacia Misner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring Item-Level Security

After granting access to the report server content, you then configure security to control which items each user can see and open. If a user’s role does not permit access to an item, the item is not visible to the user. Similarly, if the user cannot perform a certain task, the user interface does not include the option or buttons required to perform that task. Because security is inherited from the parent folder, you change the security settings only for those items requiring a different role assignment than the one configured for the upper-level folder.

Note

Note

Many of the steps described in the procedures in the following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required