Connection-scope security

The process of building a connection-scope security policy allows you to specify an individual security policy for each data source in a catalog. If you want to implement the same security policy in a group of reports that are built based on one data source connection, you can simply apply an existing security policy in this connection to them, without repeatedly building the security information for each report.

The major steps for using RLS and CLS with a connection-scope security policy are as follows:

  1. Set up the security policy.

    You use this step to set up the security policies for different report categories. The predefined security policies work within a connection range.

  2. Apply the security policy to your reports.

    After you have defined the security policies, you can then apply them to your reports respectively.

  3. Publish the reports with RLS (CLS) to JReport Enterprise Server and run them.

The following topics describe the connection-scope security in detail: