Introduction
In this chapter, we'll discuss the various layers of security built into Reporting Services. We'll begin with a look at how SSRS authenticates a user, followed by recipes for determining what a user can and cannot do once they are on the server. In addition, we'll cover security on data sources, as well as how to secure your SSRS channel with certificates.