The process of building a connection-scope security policy allows you to specify an individual security policy for each data source in a catalog. If you want to implement the same security policy in a group of reports that are built based on one data source connection, you can simply apply an existing security policy in this connection to them, without repeatedly building the security information for each report.
The major steps for using RLS and CLS with a connection-scope security policy are as follows:
You use this step to set up the security policies for different report categories. The predefined security policies work within a connection range.
After you have defined the security policies, you can then apply them to your reports respectively.
The following topics describe the connection-scope security in detail: