Security and Protection (Reporting Services in SharePoint Integrated Mode)
You can use information in this section to learn about the security features of a Reporting Services deployment that is integrated with a SharePoint product, and the security threats that you need to consider. This section also explains the authorization models and authentication providers supported in Reporting Services. It also provides information to developers that explains how to implement code access security when writing applications that use the Report Server Web service. Finally, this section includes instructions for configuring report server access and guidance for routine maintenance of report server security features.
Because this kind of deployment relies on a Reporting Services report server, the information in this section is supplemented with links to topics in the Security and Protection (Reporting Services) section of SQL Server Books Online. Together, the general Reporting Services topics and these SharePoint integrated mode topics provide information to help you configure and understand security features for a Reporting Services environment that is integrated with a SharePoint product or technology.
Security Overview
Security Overview for Reporting Services in SharePoint Integrated ModeThreat and Vulnerability Mitigation
Integrated Security and Elevated PermissionsIdentity and Access Control
Granting Permissions on Report Server Items on a SharePoint SiteUsing Built-in Security in Windows SharePoint Services for Report Server Items
Comparing Roles and Tasks in Reporting Services to SharePoint Groups and Permissions
Site and List Permission Reference for Report Server Items
Setting Permissions for Report Server Operations in a SharePoint Web Application
How to: Create, Delete, or Modify a Role (Management Studio)
Secure Deployment
Configuring Authentication in Reporting ServicesConfiguring a Report Server for Secure Sockets Layer (SSL) Connections
Secure Development
Code Access Security in Reporting ServicesUnderstanding Security Policies
Secure Deployment
Configuring Authentication in Reporting ServicesConfiguring a Report Server for Secure Sockets Layer (SSL) Connections
Secure Operation
Secure Operation (Reporting Services)