Επεξεργασία

Κοινή χρήση μέσω


Security (Report Builder)

Report Builder is a report authoring client application that is designed to work with a SQL Server Reporting Services report server. The report server can be configured to work in native mode as a stand-alone server or in SharePoint integrated mode to support reports on a SharePoint site.

In Report Builder, you can author reports, shared datasets, and reusable report parts. From a report server or SharePoint site, you can edit reports and add shared data sources, shared datasets, and shared report parts.

Note

Report parts are deprecated for all releases of SQL Server Reporting Services starting with SQL Server Reporting Services 2019 and all releases of Power BI Report Server starting with Power BI Report Server September 2022.

To author, publish, and use reports and report-related items, you should understand how security features relate to the following areas:

  • The report server or SharePoint site where you publish reports: The report server administrator or SharePoint site administrator manages this feature.

  • Published reports and report-related items: Report-related items include embedded and shared data sources and their credentials, shared datasets, parameters, report parts, and report models. The report author manages the security features that apply to these items. The report author must be granted sufficient permissions by the report server administrator or SharePoint site administrator to publish and share the items.

  • External data sources that are used by a report: The owner of the external data source manages these features.

  • Report models that are based on external data sources: The model designer manages these features.

  • Interactive report features such as parameters: The report author manages these features.

Review the information in this article to better understand how to use security features to help manage and secure reports and report-related items.

Understand security for report servers

Publishing reports and viewing reports are privileged operations. A report server administrator grants permissions to ensure that only authorized users can publish and view reports on one of the following types of report servers:

  • Report server configured in native mode

    To connect to or browse to a report server, you must have a valid URL and have sufficient permissions to access the server.

    To view or publish items on a report server, sets of permissions that apply to report-related items and operations are organized into roles. A report server administrator assigns you to one or more roles. For example, the predefined role Browser enables you to view reports, folders, models, and resources.

    If you can't connect to or browse to a report server, contact the report server administrator. For more information, see Reporting Services security and protection.

  • Report server configured in SharePoint integrated mode

    To connect to a SharePoint site that is integrated with a report server, you must have a valid URL to the SharePoint site or subsite. You must also have sufficient permissions to access it.

    Permission to access report-related items and operations is granted through SharePoint security policies that map a user or group account with a permission level, relative to an item.

    If you can't connect to or browse to a SharePoint site or subsite, contact the SharePoint site administrator.

Understand security for published reports and report-related items

The report server administrator manages security for reports and report-related items. Report-related items include embedded and shared data sources including credentials, shared datasets, parameters, report parts, and models.

On a report server or SharePoint site, reports and report-related items and operations are independently securable. Permission to access items and operations is granted through security policies that map a user or group account with a permission level, relative to an item. Items in the container inherit the permissions on the container to reduce the complexity and overhead of maintaining a large number of policies. For example, if a user has the specific View Reports permission on a folder, they have View Reports permission on the items in the folder.

Permissions can be overridden on items or folders by using item level security. When item-level security is applied, permission inheritance from the parent container no longer applies to the item. If item-level security is applied to a folder, nested folders inherit the same permissions.

If you can't browse to and find items that someone else published for you, you might have a permissions issue on the item or on the folder.

You can enable others to browse to and find items that you published to be shared. To do so, you must work with the report server administrator to set up a folder organization that provides access to your users. Access must be available for authoring reports and for running published reports.

For more information, see the following articles:

Update notifications for report parts

Report parts are published to a report server so that others can share them. By design, you specify the location to publish report parts to.

Users who include report parts in their reports can enable the update feature. When this feature is enabled, users receive notifications when report parts change on the report server.

If report parts are moved from the original location, the update notice includes both the current location and the previous location of the report part. Accept updates only from trusted locations.

For more information, see Report parts (Report Builder).

Understand security for report data and external data sources

To access data from each external data source in a report, you create an embedded data source or add a reference to a shared data source or shared dataset in your report.

For each external data source, you must supply credentials that are sufficient to access the source and the underlying data. The data source owner specifies the type of credentials that provides this access.

Credentials aren't saved in the report definition. They're managed independently from the report on the report server or SharePoint site and on the report authoring client.

At report design time, credentials are used to run dataset queries and preview the report. At run time, credentials are used to run the report and cache query results. You can also cache shared dataset query results independently. Design time and run time credentials might differ. For more information, see Specify credentials in Report Builder.

For more information about securing data, see Security center for SQL Server Database Engine and Azure SQL Database.

For more information about data sources, see Create data connection strings - Report Builder.

Understand models and security filters

When data is retrieved from a report model that is based on external data, you can apply security filters in the model. This feature is a good way to secure data so that each user who runs a report can see only the data that they have permissions to.

Report parameters aren't used for row-level security; they don't prevent users or groups of users from seeing specific rows of data. To apply security to the data displayed within a report, you must use security filters or model item security.

Understand security for report authoring for interactive features

Reports frequently use parameters to enable a user to interactively customize their view of a report. Use the following tips to help design reports that follow good practices:

  • Don't use parameters that are based on query parameters and that are type Text unless you provide valid values. An available values list helps a user choose only valid values. Without an available values list, you can't restrict which values a user can enter.

  • Don't use the global [&UserID] to secure private data. As a report parameter, this value can be specified in a report URL by using URL access syntax. Using this value in an expression in a shared dataset prevents the dataset from being cached. For more information, see URL access parameter reference.

After items are published to a report server, the report server administrator can help secure them by assigning role-based security or folder and item level security. For more information, see Secure reports and resources.