Chapter 13 Securing Report Server In This Chapter Examining security features of Reporting Services Understanding authorization model and role assignments Configuring item-level and site-level security Granting rights and privileges Protecting your Report Server from attack Understanding data security When you re safeguarding corporate assets through the secure distribution of information to people on a need-to-know basis (which business intelligence can get into), it becomes a federal case when secure information gets into the wrong hands. Security considerations alone are enough to eliminate a reporting tool from the list of permitted tools in any organization. Secure information access and delivery are key to safeguarding the assets of your company. Without secure information management capabilities, we would still be in the Dark Ages of paper reports distributed on a need-toknow basis within the bowels of the company. Therefore, knowing how to secure a reporting platform to ensure that information is made available based on a permission system is key to the successful deployment of reporting and analysis capabilities. This chapter covers the security considerations you need to know. Understanding Security Fundamentals Reporting Services uses a role-based security model to control access to reports, folders, and other items that are managed by a Report Server. The role-based security model is similar to role-based security models offered by other applications. Reporting Services enables you to categorize users into groups or roles base on how they interact with the system and its resources. You can map specific user groups to specific roles that can perform specific tasks. I talk about the Security role model in the sections that follow.
Note: If you are looking for good and high quality web space to host and run your application check Lunarwebhost JSP Web Hosting services