Solved

SSRS Browser role.

Posted on 2010-09-22
9
568 Views
Last Modified: 2012-05-10
I am setting up the security for SSRS.

For a user who will only need to see report reports should I only assign them to the 'Browser' role.
0
Comment
Question by:Mr_Shaw
  • 5
  • 4
9 Comments
 
LVL 29

Accepted Solution

by:
QPR earned 500 total points
ID: 33732805
spot on, that is exactly what the role is created for
0
 

Author Comment

by:Mr_Shaw
ID: 33732986
I have a user setup with the 'Browser' role and their System Role Assignments is set to 'System User'.

They still however can see the 'Data Sources' folder.

Is there a way in which I we can stop them seeing this folder?
0
 
LVL 29

Assisted Solution

by:QPR
QPR earned 500 total points
ID: 33733006
go to the properties of the DS and make it hidden
0
 
LVL 29

Assisted Solution

by:QPR
QPR earned 500 total points
ID: 33733016
sorry that should be the datasource folder
0
Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

 

Author Comment

by:Mr_Shaw
ID: 33733060
I now becomes hidden for everyone including me. How do I unhide it or have it hidden for some users and visable for others?
0
 
LVL 29

Assisted Solution

by:QPR
QPR earned 500 total points
ID: 33733203
for you, just click the show details icon in the folder. for others it is hidden. This is how it works
0
 

Author Comment

by:Mr_Shaw
ID: 33733394
That does work. But when I click show details using an account with just the 'Browser' role I can still see the 'Data Sources' folder.
0
 
LVL 29

Assisted Solution

by:QPR
QPR earned 500 total points
ID: 33738435
have you tried having a separate folder for the datasources and then putting security on that?
0
 

Author Closing Comment

by:Mr_Shaw
ID: 33770564
thanks
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Ever needed a SQL 2008 Database replicated/mirrored/log shipped on another server but you can't take the downtime inflicted by initial snapshot or disconnect while T-logs are restored or mirror applied? You can use SQL Server Initialize from Backup…
The Delta outage: 650 cancelled flights, more than 1200 delayed flights, thousands of frustrated customers, tens of millions of dollars in damages – plus untold reputational damage to one of the world’s most trusted airlines. All due to a catastroph…
Via a live example, show how to extract insert data into a SQL Server database table using the Import/Export option and Bulk Insert.
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now