Export (0) Print
Expand All
1 out of 1 rated this helpful - Rate this topic

Securable Items

Updated: 14 April 2006

Reporting Services uses role-based security to control access to items that are stored on a report server. You can create role assignments that determine who has access to folders, reports, report models, resources, and shared data sources. Other constructs, such as schedules and subscriptions, are not explicitly secured. Schedules and subscriptions operate within the security of a report.

Security is inherited within the report server folder hierarchy. You can override inherited security by defining security for individual items.

The following table lists securable items and describes their characteristics.

Item Characteristics

Folders

Folder security applies to the folder itself and the items it contains. The Home folder is the root node of the folder hierarchy. Security that you set for this folder establishes the initial security settings for all subordinate folders, reports, resources, and shared data sources in the folder hierarchy. For more information, see Securing Folders.

My Reports is a special-purpose folder that is secured through an implied role assignment based on a dedicated role. For more information, see Securing My Reports.

Reports

Reports and linked reports can be secured to control the range of actions that users can perform, such as changing the properties of a given report.

Report history is secured through the report that contains the history. You cannot secure individual snapshots within report history.

For more information about report security, see Securing Reports and Resources.

Report models

You can specify role assignment on all or part of a report model. Because report models can be quite extensive, you might want to secure the model items that map to confidential data. For more information, see Securing Models.

Resources

Resources can be secured to control access to the resource itself and its properties.

Only stand-alone resources can be secured as separate items. Resources that are embedded within a report cannot be secured separately from that report.

For more information about resource security, see Securing Reports and Resources.

Shared data sources

Shared data sources can be secured to limit access to the item and its property pages. For more information, see Securing Shared Data Source Items.

Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft. All rights reserved.