?
Solved

Report Builder 1.0

Posted on 2014-02-26
2
Medium Priority
?
416 Views
Last Modified: 2014-03-13
I am working on Report Builder 1.0 AdHoc Reporting tool and want to implement Security/ Entitlements on the Tables/ data that the users can access. I cannot use multiple logins. I have a table that has the UserID and the RegionID.

I want to restrict the users to data for only the region that they are entitled for and return the data to them through AdHoc Reporting. Anyway to build this security/ Entitlements is highly appreciated.
0
Comment
Question by:Rdichpally
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 101

Accepted Solution

by:
mlmcc earned 1000 total points
ID: 39892512
Are the users logging into the application?

How are you getting the user id for the one running the report?

Assuming you can use the UserID/Region table to link to the rest of the data just create a where clause like

UserLoggedIN = UseridTable.UserId

Link the regionid from the table to the rest of the tables and it should take care of the security

mlmcc
0
 

Author Closing Comment

by:Rdichpally
ID: 39927134
Thanks
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Backups and Disaster RecoveryIn this post, we’ll look at strategies for backups and disaster recovery.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question