To apply a connection-scope security policy to a report, follow the steps below:
Notes:
| main | sub | Users in Policy | Users NOT in Policy |
|---|---|---|---|
| Ð | Ð | No security policy is applied to either the primary or sub report. Users can therefore view all records in the both main and sub report. | |
| Ï | Ð | Can view specified records in the primary report and all records in the sub report. | Can view no records in the primary report and all records in sub report. |
| Ð | Ï | Can view all records in the primary report and specified records in the sub report. | Can view all records in the primary report and no records in the sub report. |
| Ï | Ï | Can view specified records in both the primary and sub report. | Can view no records in either the primary or sub report. |