About the security model
All files stored in an Actuate BIRT iServer Encyclopedia volume are subject to a standard security procedure, which restricts file access to authorized users. The iServer security model is based on roles and privileges. The iServer administrator creates roles for various job functions in an organization, such as finance, marketing, and sales. The privileges, or permissions, to perform certain operations, such as read, write, and execute, are assigned to roles. Users are assigned roles, and, through these roles, acquire the privileges to perform particular operations on folders and files.
With this level of security, each user has access to files and folders on a need-to-know basis. For security at a more detailed level, iServer provides the following types of security:
*
Page-level security, which controls user access to particular sections or pages in a report. This security feature requires the Page Level Security option on iServer. The published report must be assigned the Secure Read privilege.
*
Data security, which controls user access to a particular set of data provided by a BIRT data object. This security feature is part of the core iServer functionality. The published data object must be assigned the Secure Read privilege.
The security procedure that applies to files and folders in an iServer volume is implemented entirely in iServer. Page-level security and data security, however, require implementation in Actuate BIRT Designer as well.

Additional Links:

Copyright Actuate Corporation 2012