CONTENTS
xii
Performing Execution Auditing and Performance Analysis...........................................308
Configuring SSRS Logging....................................................................................................................309
Transforming the ExecutionLog Table..................................................................................................309
Designing the Log Report..............................................................................................312
Monitoring Performance................................................................................................313
Controlling SSRS Programmatically...............................................................................315
Controlling SSRS with SOAP.................................................................................................................315
Controlling SSRS with WMI...................................................................................................................326
Summary.......................................................................................................................327
Chapter 11: Securing Reports.............................................................................329
Encrypting Data.............................................................................................................329
Introducing Encryption...................................................................................................330
Securing Network Traffic Using SSL..............................................................................330
Analyzing HTTP Traffic..........................................................................................................................330
Applying an SSL Certificate..................................................................................................................334
Capturing HTTPS Traffic.......................................................................................................................335
Securing Data Storage in SSRS............................................................................................................337
Setting Up Authentication and User Access to Data.............................................................................3 39
Introducing SSRS Roles.................................................................................................340
Testing SSRS Role Assignments..........................................................................................................344
Filtering Report Content with User!UserID............................................................................................352
Setting Data Source Security................................................................................................................354
Setting SQL Server Permissions...........................................................................................................355
Auditing Reports............................................................................................................356
SSRS Auditing.......................................................................................................................................356
Introducing Log File Auditing................................................................................................................358
Summary.......................................................................................................................359