Solved

SSRS Data Security Options?

Posted on 2010-09-13
1
451 Views
Last Modified: 2012-05-10
Experts,

What are the different options available in SSRS 2008 for setting up Security to the DATABASES in a scenario where all data is housed / collecting into a single DB.

We need to allow limited access for the end users to view their OWN DATA.

In this scenario, am I limited to creating separate reporting folders and hard coding within each report to only allow end-uisers to see their own data?

I know the info above is a little scetchy, but the base question is, what are the different security options for SSRS 2008 in the case of us limiting access the same database for different Business Groups witin our company?

Thanks
0
Comment
Question by:MIKE
1 Comment
 
LVL 10

Accepted Solution

by:
itcouple earned 500 total points
ID: 33663799
Hi

If you use T-SQL then usually you limit the data using reports itself and you can simplify this by creating a parameter which will pick up userID (=User!UserID) and apply your filter logic (In your database you should have a table with userID and permissions so you can change permissions without modifying reports).

(If you use MDX, OLAP cube then there are extra options to do cell permissions but I don't think that applies in this case)

Regards
Emil

0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article I will describe the Detach & Attach method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
How to leverage one TLS certificate to encrypt Microsoft SQL traffic and Remote Desktop Services, versus creating multiple tickets for the same server.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question