Skip to main content

Notifications

Announcements

No record found.

Community blogs

Featured

Latest blog posts

View all
Like ( 0 )
Role-Based Access to Reports and Resources

To grant access to reports and resources, you can allow users to inherit existingrole assignments from a parent folder or create a new role assignment on the itemitself.In most cases, you will probably want to use the permissions that are inherite...

Hossein.K 6,642
Like ( 0 )
Mitigating HTML Injection Attacks in a Published Report or Document

In Reporting Services, reports and resources are processed under the securityidentity of the user who is running the report. If the report contains expressions,script, custom report items, or custom assemblies, the code runs under the user'scr...

Hossein.K 6,642
Like ( 0 )
Report Parameters and Script Injection

Report Parameters provide flexibility for the overall report design and execution.However, this same flexibility can, in some cases be used by an attacker in luringattacks. To mitigate the risk of inadvertently running malicious scripts, only open...

Hossein.K 6,642
Like ( 0 )
Mitigating Script Injection Attacks in a Hyperlink in a Published Report or Document

Reports can contain embedded hyperlinks in the value of the Action property ona report item or part of a report item. Hyperlinks can be bound to data that isretrieved from an external data source when the report is processed. If amalicious user mo...

Hossein.K 6,642
Like ( 0 )
Securing Confidential Reports

Reports that contain confidential information should be secured at the data-accesslevel, by requiring users to provide credentials to access sensitive data. For moreinformation, refer to the Specifying Credential and Connection Information forRepo...

Hossein.K 6,642
Like ( 0 )
Mitigating SQL Injection Attacks in a Parameterized Report

In any report that includes a parameter of type String, be sure to use an availablevalues list (also known as a valid values list) and ensure that any user running thereport has only the permissions required to view the data in the report. When yo...

Hossein.K 6,642
Like ( 0 )
Configure security settings in Microsoft Dynamics AX

Complete the following tasks in Microsoft Dynamics AX:• Determine which reports each Microsoft Dynamics AX role shouldhave access to.• Verify that each Microsoft Dynamics AX role has the correct dutiesand privileges assigned to it in order to acce...

Hossein.K 6,642
Like ( 0 )
Configure security settings in Reporting Services

Complete the following tasks in Reporting Services:• Assign users to the DynamicsAXBrowser role in Reporting Services.For detailed instructions about how to assign users to ReportingServices roles, refer to the SQL Server documentation on MSDN.• I...

Hossein.K 6,642