Solved

Reporting Services - Access control

Posted on 2008-06-25
6
441 Views
Last Modified: 2008-06-27
Hi,

I'm trying to make a report that:

If person x uses the report, it can only access reports that conserns him or her.

How is this possable?

Thank you.

P.S. My idea was to somehow get the windows user of the person using the report, and then use the windows user in your queries to check if the person has access or not.
0
Comment
Question by:Endelm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 13

Accepted Solution

by:
rickchild earned 500 total points
ID: 21865692
You can return the windows user by using the expression:

=User!UserID

But you will still need a lookup set up to check the user groups, either using LDAP for active directory or something like DumpSEC to get local groups.
0
 

Author Comment

by:Endelm
ID: 21872608
Thanks a lot rickchild!

How can I use this in a query in Reporting Services?
0
 
LVL 13

Expert Comment

by:rickchild
ID: 21874932
Are you looking to create one report with links to other reports they are allowed to see, or only show content in a report which the users can see?
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:Endelm
ID: 21875676
I've found out how. Thanks a lot! :-)
0
 
LVL 13

Expert Comment

by:rickchild
ID: 21875756
OK Great, how did you do it?
0
 

Author Comment

by:Endelm
ID: 21881569
I used a parameter in a query and gave it the default value = =User!UserID

Then I set the parameter to be hidden (checkbox in the parameter settings).
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data architecture is an important aspect in Software as a Service (SaaS) delivery model. This article is a study on the database of a single-tenant application that could be extended to support multiple tenants. The application is web-based develope…
From implementing a password expiration date, to datatype conversions and file export options, these are some useful settings I've found in Jasper Server.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question